1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
3 years ago
9

How is an interpreter different from a compiler?

Computers and Technology
2 answers:
lyudmila [28]3 years ago
7 0

Answer:

An interpreter is quite different from a complier due to the following statement below:

O. An interpreter translates and executes code line by line, while a compiler translates all code at once so that it is ready to be executed at any time.

Explanation:

For an interpreter, it works in translating and execution of the codes line after another line. In a situation where there is a mistake in the code, the next line would not be able to be executed, but rather display error message. On the other hand, compiler translate all codes at once and execute them as a single work.

<em>During its translation of the codes in compiler, should there be any error, it would not be able to execute despite the fact that, the error might be in the last line of the code.</em>

irina [24]3 years ago
4 0

Answer:

a

Explanation:

taking test right now

You might be interested in
Please assist me with these questions - Do not send me links. Issues in opening the links:
Thepotemich [5.8K]

Answer:

15) Halo 2

17) Sims

18) B

19) A

20) B

Explanation:

3 0
3 years ago
A hot spot is the __________. A. Point that collides with other objects B. Point an object spins around when it rotates C. First
Ber [7]
I would think it's A
5 0
3 years ago
<img src="https://tex.z-dn.net/?f=%5Cmathcal%7B%5Cfcolorbox%7Bblue%7D%7Byellow%7D%7B%5Cred%7BQUESTIONS%3A%7D%7D%7D" id="TexFormu
Paraphin [41]

Answer:

1. A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other.

2. A computer network comprises two or more computers that are connected—either by cables (wired) or WiFi (wireless)—with the purpose of transmitting, exchanging, or sharing data and resources

3. LANs are only designed to connect devices. ... In comparison, WANs can connect all of these same devices as well as LANs. In other words, a WAN can connect multiple LANs together so that all of their respective devices can communicate with each other. WANs are also more difficult to set up and maintain than LANs

Explanation:

hope this helps u

4 0
3 years ago
Read 2 more answers
The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
Ksju [112]

Answer: Authorization process

Explanation

Authorization is a security measure to determine the access levels or user/client rights to use to system resources like files, computer programs, data and other features on a computer. Authorization process is the process of granting or denying access to a network resource that allows the user access to various resources based on the his/her identity.

Most web security systems are based on a two-step Authorization process. The first step ensures and approves the user's identity, that is authentication and the second stage is authorization, which allows the user to access the various resources based on the user's identity.

Therefore the first thing you should do when you suspect "illicit use of, or threats to, computer resources and sensitive information is a strong authentication and authorization process".

5 0
4 years ago
What is the purpose of fcc?
melamori03 [73]
<span> The Bureaus and the Office of Engineering and Technology process applications for licenses and other filings, analyze complaints, conduct investigations, develop and implement regulatory programs and participate in hearings, among other things. </span>
3 0
3 years ago
Other questions:
  • How are procedural and object-oriented programming approaches similar?
    9·1 answer
  • Write a simple compilable program that outputs to an Excel-compatible XLS file these two rows: (1) a header row with headings fo
    10·1 answer
  • What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
    8·2 answers
  • A laptop computer communicates with a router wirelessly, by means of radio signals. the router is connected by cable directly to
    10·1 answer
  • Can you call a mobile a computer. It Yes<br>why? If No why​
    7·2 answers
  • Which kind of results will appear using the search query "Frosty the Snowman" in quotation marks?
    6·1 answer
  • How many bytes are there in 256 Kbytes?
    6·1 answer
  • Which daemon manages the physical memory by moving process from physical memory to swap space when more physical memory is neede
    14·1 answer
  • Use the drop-down menus to match the description to the correct audio-editing technique or term. deleting unwanted sounds increa
    14·2 answers
  • Can some one please help
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!