1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
3 years ago
13

Drag the right word to it’s definition

Computers and Technology
1 answer:
Kipish [7]3 years ago
3 0

Answer:

Program

Explanation:

Program has a set of codes that can control a machine or computer. pseudo code is meant for humans to read not machines. A variable is likely to change

You might be interested in
Where do you find the instructions, learning objectives, evaluation and scoring for this aba assignment?.
sp2606 [1]

The instructions, learning objectives, evaluation and scoring for Aba assignment can be found on Preamble of the Applied Behavior Analysis (ABA) assignment.

<h3>What is ABA?</h3>

Applied Behavior Analysis refers to a therapy that is based on the science of learning and behavior.

Hence, the instructions, learning objectives, evaluation and scoring for Aba assignment can be found on Preamble of the Applied Behavior Analysis (ABA) assignment.

Read more about ABA

<em>brainly.com/question/11449763</em>

6 0
3 years ago
Why is image compression an important part of vidoetechnology?
OLEGan [10]

Answer: Image compression is the technique which is responsible for the reduction in the size of the image according to the need of the video technology. Image compression is done because of the following reasons:-

  • Makes more space for the storage and creates space.
  • It also reduces the time that is used up for the uploading of the video through internet.
  • Text, labels etc might also be needed to inserted along with the image .

4 0
3 years ago
PLEASE HELP ASAP! 15 POINTS!!
yan [13]

Answer

Rafael can go to the What's New option under the Help tab.

3 0
4 years ago
Read 2 more answers
What is copyrights used for​
Inga [223]

if something belongs to someone it makes it so someone else cannot steal it and claim it to be their own

4 0
3 years ago
Read 2 more answers
Why might information overload be a concern for consumers who use a cell phone app to research a particular purchase? What would
mrs_skeptik [129]

Answer:

Explanation:

Information overload is a term which is utilized to depict the trouble of understanding an issue and adequately settling on choices when one has excessively information about that issue. By and large, the term is related with the exorbitant amount of every day information. Information overload happens when the measure of contribution to a framework surpasses its handling limit. Leaders have genuinely constrained psychological preparing limit. Thus, when information overload happens, almost certainly, a decrease in choice quality will happen. This why it becomes a concern when it is not tackled wisely by not remaining focused.

Well, I would recommend the app developers to avoid the things are as follows:

• Give supporting information. - If a client needs more information, ensure it's to hand for them.

• Make it simple for the client to make a move. - If they have to finish an assignment there and afterward make it open and make it self-evident.

• Clarify what can anyone do the information. - What move should the client make? For what reason should the take it?

• Keep it important. - Information that really addresses the client's issues is more averse to overpower.

• Give adjusted information. - You should introduce the two sides of the coin as opposed to only one.

• Keep things straightforward. - The less information you present – the less demanding it is to get it.

• Keep it clear. - Simplicity and importance are great however information needs clearness to be successful

7 0
3 years ago
Other questions:
  • An online company wants to conduct real-time sentiment analysis about its products from its social media channels using SQL.
    12·1 answer
  • Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that i
    13·1 answer
  • The Linux operating system was created by which software engineer?
    15·1 answer
  • _____ refers to the busiest calling hour of the day, week, month or year. And _____ refers to the average length of time the sub
    14·1 answer
  • One of the main responsibilities employers have under OSHA is to:
    9·2 answers
  • Which icons allows you to add a style to a chart
    13·1 answer
  • Write a program that prompts the user to enter a series of numbers between 0 and 10 asintegers. The user will enter all numbers
    6·1 answer
  • Use the table on the right to convert from decimal to hexadecimal.
    7·2 answers
  • PLEASE HELP FIRST ONE TO ANSWER WILL GET BRAINLIEST!!
    10·1 answer
  • What type of collection is created with each assignment statement?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!