Answer:
Both compiled and interpreted languages are high-level languages and translate code for a computer to understand.
Explanation:
The one similarity between compiled and interpreted languages is that they are both high-level languages.
A high-level language is a computer language written in easy to understand human language which is then converted to machine code for the computer to understand.
A high-level language can either be interpreted or compiled.
An interpreted is a language in which the code is translated line by line before execution while a compiled language is one in which the source code is converted directly into machine language before execution.
So, <u>the similarity between both languages is that they are high level languages and translate code for a computer to understand. </u>
Access: full electronic participation in society.
Commerce: electronic buying and selling of goods.
Communication: electronic exchange of information.
Literacy: process of teaching and learning about technology and the use of technology.
Etiquette: electronic standards of conduct or procedure.
Law: electronic responsibility for actions and deeds.
Rights & Responsibilities: those freedoms extended to everyone in a digital world.
Health & Wellness: physical and psychological well-being in a digital technology world.
Security (self-protection): electronic precautions to guarantee safety.
IMPORTANT
Etiquette. Students need to understand how their technology use affects others. ...
Literacy. Learning happens everywhere. ...
Rights and responsibilities. Build trust so that if something happens online, students are willing to share their problems or concerns about what has happened.
Answer:
randint
Explanation:
Just did my quiz and got a 100%
Answer: C. Data type
Explanation:
data types are defined as the data storage format that a variable can store a data to perform a specific operation. Data types are used to define a variable before its use in a program. Size of variable, constant and array are determined by data types.
Answer:
c. both the user and the provider of encrypted data.
Explanation:
In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.