1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedaia [141]
3 years ago
6

What is one similarity between compiled and interpreted programming languages? (5 points)

Computers and Technology
1 answer:
Rashid [163]3 years ago
8 0

Answer:

Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.

Explanation:

The one similarity between compiled and interpreted languages is that they are both high-level languages.

A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.  

A high-level language can either be interpreted or compiled.

An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.

So, <u>the similarity between both languages is that they are high level languages and translate code for a computer to understand. </u>

You might be interested in
Recall that when the built-in function open() is called to open a file for reading, but it doesn't exist, an exception is raised
Pie

Answer:

could you shorten it a little?

Explanation:

3 0
4 years ago
The goal of the ____ memory allocation algorithm is to find the smallest memory block into which a job will fit.
Pani-rosa [81]
The goal of the BEST-FIT memory allocation algorithm is to find the smallest memory block into which a job will fit.
5 0
2 years ago
Read 2 more answers
Which statement is true about customizing presentation programs?
pashok25 [27]
A presentation program<span> is a </span>software<span> package used to display information in the form of a </span>slide show. It has three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images, and a slide-show system to display the
6 0
4 years ago
DISEÑAR EL SIGUIENTE FORMULARIO: Y CALCULAR EN PHP: ¿cuánto pagaría un cliente, si elige un plan de pagos de acuerdo a los sigui
Karolina [17]
Sorry don’t get your language
3 0
3 years ago
Do you believe that OOP should be phased out and we should start working on some alternative(s)?
AlekseyPX

Answer:

Explanation:

The OOP or object-oriented programming can be used in day to day situations, and can be more simple to understand for the programmer and for the user, for beginners is easier to learn with a visual interface, and even we can improve our imagination with objects, colors and aesthetic models, we can reuse, and we have a structure to hide our code, OOP It is not an obsolete technology yet.

5 0
4 years ago
Other questions:
  • I need some cool things to do with windows command prompt.
    13·1 answer
  • Which ipsec component is software that handles the tasks of encrypting, authenticating, decrypting, and checking packets?
    10·1 answer
  • What's the value of this Python expression? ((10 &gt;= 5*2) and (10 &lt;= 5*2))
    13·1 answer
  • What is the difference between the throw statement and the throws clause?
    10·1 answer
  • Alarm filtering may be based on combinations of frequency, similarity in attack signature, similarity in attack target, or other
    11·1 answer
  • What do GUI use except​
    10·1 answer
  • 1. While cell phones provide Freedom and mobility,they can also become a leash, compelling user's to answer them anywhere and an
    11·1 answer
  • What are the different parts of a word processing program?<br><br> I need this ASAP please help!!
    6·1 answer
  • You're making great progress on your assignment. You've defined the purpose of your message, identified both the primary and sec
    9·1 answer
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!