1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa [96]
3 years ago
5

Which two programming languages require the program to be converted into executable code using a compiler? (Choose two.)

Computers and Technology
1 answer:
forsale [732]3 years ago
8 0

Answer:

C# and Java

Explanation:

Compiler can be regarded as a program that helps in transforming a source code( source program) to another program knowns as machine code. Some of the programming languages that needs a compiler are C# and Java. The compiler will collect the the set of instructions of the new program that was written using high level language and translate it into machine language.

You might be interested in
Help me with this please​
Gnesinka [82]
Different types of connections are..

-A network is two or more devices connected through links.

-There are two possible types of connections: point-to-point and multipoint.

-A point-to-point connection provides a dedicated link between two devices.

Explain the different types of topologies

-Star network…
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn't allow direct communication.

-Ring network…
A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology

-Bus network…
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop 

-tree topology…
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates 

-Computer network…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

-Mesh networking…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

Different type of networks

-Computer network…
Virtual Private Network (VPN). By extending a private network across the Internet, a VPN lets its users send and receive data.

-LAN…
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. 3. Wireless Local Area Network (WLAN).

-Wide area network…
Wide area network, or WAN. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files etc.

-Metropolitan area network…
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as compared to WAN. It connects two or more computers that are apart.

-Wireless LAN…
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office 

-Wireless network…
A Wireless Local Area Network or WLAN is a network that is used to connect different devices without using wires etc.

-Storage area network…
Storage Area Network is a type of network which allows consolidated, block-level data storage. It is mainly used to make storage last longer etc.

-Personal area network…
PAN can be used for establishing communication among these personal devices for connecting to a digital network and the internet.

-Campus area network…
A Metropolitan Area Network or MAN is consisting of a computer network across an entire city, college campus, or a small region. This type of network is large.

Explain your own understand about protocol and standards

A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it.

explain layers in OSI model

Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Explain layers in tcp/ip model

Four layers of TCP/IP model are 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Interface. ... It is also known as a network layer. Transport layer builds on the network layer in order to provide data transport from a process on a source system machine to a process on a destination system.

what are the peer to peer processing

In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Unlike traditional client-server networking, no devices in a P2P network are designated solely to serve or to receive data
5 0
2 years ago
With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
Wewaii [24]

Answer:

The correct answer is C) With respect to PERT and​ CPM, slack is the amount of time a task may be delayed without changing the overall project completion time.

Explanation:

The CPM (Critical Path Method) method is frequently used in the development and control of projects whose tasks have a fixed duration while the PERT (Program Evaluation and Review Techniques) method is a set of techniques with the same purpose but that allows to work with tasks with estimated probability duration but not deterministic.

Both methods are based on developing a complete scheme that includes all the tasks of a project linked to each other according to their sequence, determining the duration and analyzing different ways of reconfiguring the task planning to optimize the use of the resources of according to the general objectives of the project.

There are tasks that to start performing them must have been completed one or more previous tasks. The overall duration of the project is determined by the Critical Path, which is the sequence of tasks of greater duration. The tasks belonging to the critical path have to be carried out with special care because delays in them would cause delays in the total achievement of the project. That is why these tasks have no slack.

The rest of the tasks have some slack, which is determined by the time that a previous task can be delayed without delaying the total time of completion of the project, that is, not exceeding the duration determined by the critical path.

That is that why we say that the <em>slack</em><em> is the amount of time a task may be delayed without changing the overall project completion time</em>.

8 0
3 years ago
Need this answered quickly, 40 PTS!
drek231 [11]

Hello,


Answer: In 1965, Gordon Moore noticed that the number of transistors per square inch on integrated circuits had doubled every year since their invention. Moore's law predicts that this trend will continue into the foreseeable future. ... The 18-month mark is the current definition of Moore's law.


Please read and you will have your answer!


If you did not love this answer let me know and I will try again.



7 0
2 years ago
Read 2 more answers
When was the phone Built
quester [9]
The first phone was made in 1854 by <span>Antonio Meucci.

Other inventors like </span>Johann Philipp Reis, <span>Alexander Graham Bell, Elisha Gray, and Thomas Edison reinvented the telephone or enhanced it.</span>
3 0
3 years ago
Read 2 more answers
Under which reflection(s) is the image of line m also a line?
lubasha [3.4K]

Answer:

c

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following are examples of algorithms? (Select all that apply, if any do.)
    15·2 answers
  • Ok, so this isn't a tech question it's about a game, moomoo.io so don't hate on this if you don't know it, 40 points to whoever
    12·2 answers
  • The space force enhancement function concerned with providing data on meteorological, oceanographic, and space environmental fac
    12·1 answer
  • Please help me!! 10 Points are waiting!!
    8·1 answer
  • Which grapgic element loads faster when used with text or audio
    7·1 answer
  • If(moreDate == true)
    7·1 answer
  • What key should i press to leave the cell as it orginally was
    9·1 answer
  • O Why was the Internet originally constructed? Oto enable researchers to communicate
    6·2 answers
  • Custom actions help your users by
    6·1 answer
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!