1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
3 years ago
6

What are the words that make up a high-level programming language called?

Computers and Technology
1 answer:
DedPeter [7]3 years ago
4 0

Answer:

just ask your teacher

Explanation:

You might be interested in
What is an border in html
kompoz [17]

Borders can be applied to most HTML elements within the body. To make a border around an element, all you need is border-style . The values can be solid , dotted , dashed , double , groove , ridge , inset and outset . border-width sets the width of the border, most commonly using pixels as a value.

8 0
3 years ago
2. A data catalog identifies all of the following, except: a. Attribute data type b. Attribute range of values c. Attribute cons
alexandr1967 [171]

Answer:

c. Attribute constraints

Explanation:

A data catalog identifies all of the following, except: "Attribute constraints"

The above statement is TRUE because a Data Catalog, a metadata management service, operates by searching for key data, understand and manage data for usefulness.

Data Catalog checks on the BigQuery datasets, tables, and views and checks both technical and business metadata by identifying the following attributes:

1. Data type

2. Range of values

3. Value for Instructor ID

5 0
2 years ago
What is administrator access? Multiple Choice refers to how quickly a system can transform to support environmental changes perf
IrinaVladis [17]

Answer:

Administrator access is:

refers to the varying levels that define what a user can access, view, or perform when operating a system refers to the time frames when the system is operational

Explanation:

The reasons behind this answer are that in the first place the administrator role is the maximum role an account can have in the operating system. Controlling the different levels of access the rest of the accounts can have on the system. It then is a hierarchical role, not the changes someone can execute in a certain environment, these are called rules.

3 0
3 years ago
A(n) _____ causes a value to be sent from a called method back to the calling method.
Amanda [17]
<span>A return statement causes a value to be sent from a called method back to the calling method.
</span>When used in computer programming the return statement causes execution to leave the current subroutine and resume at the return address, where the term return address denotes the point <span>in the code immediately after where the subroutine was called.</span>
3 0
3 years ago
By issuing concert tickets on the blockchain, fans can verify transfer of ownership from one digital wallet to another, rather t
MrRa [10]

Answer:

a. double-cross

Explanation:

 Using the blockchain technology in the case of issuing concert tickets solves the problem with double-cross, which is when someone cheats another person who had trusted in them for some transaction. <em>A great asset with blockchain is the transparency with all the transactions because they are registered and cannot be erased or changed.</em>

3 0
3 years ago
Other questions:
  • Which table option automatically adjusts column widths to fit cell content? autofit contents merge cells autofit window fixed co
    5·1 answer
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • Which is the process that a wireless router uses to translate a private ip address on internal traffic to a routable address for
    14·1 answer
  • You have dinner with your family and tell them that you have taken bcis. your mother tells you that she is proud of you and that
    9·1 answer
  • Your company has purchased another company that also uses Windows Server 2016 and Active Directory. Both companies need to be ab
    11·1 answer
  • Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the
    15·1 answer
  • The illustration shows different types of text language.
    5·2 answers
  • Working with do-while loop
    9·1 answer
  • To locate all the documents in a Mongo database that match an expression, use the _____________ method.
    12·1 answer
  • What do you expect the future trends of an operating system in terms of, cost, size, multitasking, portability, simplicity
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!