1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hjlf
3 years ago
6

What are the words that make up a high-level programming language called?

Computers and Technology
1 answer:
DedPeter [7]3 years ago
4 0

Answer:

just ask your teacher

Explanation:

You might be interested in
Answer for a, b, and c
Darya [45]

The answer is a. im pretty positive but if im wrong super sorry

5 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
If you found out that your friend was blogging unsafely, which of the following would be a good action to take
emmasim [6.3K]
A is the best and safest answer. you don't want to sound like you are trying to control them or tell them what they should or should not do. <span />
3 0
2 years ago
Read 2 more answers
A multimeter device is used to measure what ?
valentinak56 [21]

Answer:

A multimeter is an electronic tool used to measure voltage, amps and resistance across circuits. By attaching two leads to different parts of an electrical system, professionals can use multimeters to detect levels of voltage and resistance, or changes in electrical currents.

Explanation:

5 0
3 years ago
Read 2 more answers
Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detec
Mars2501 [29]

Answer:

for (int i=0; i<passCode.length(); i++) {

           if ((passCode.charAt(i) >= 65 && passCode.charAt(i) <= 90) || (passCode.charAt(i) >= 97 && passCode.charAt(i) <= 122)) {

               System.out.println("Alphabetic at " + i);

           }

}

Explanation:

The rest of the code should be as above.

In order to check if the character is alphabetic or not, we need to use ASCII table. Characters are represented as integers in the ASCII table. For example "a" equals 97, "A" equals 65.

Then all we need to is to check if the character value in ASCII is in alphabetic ranges. If it is, print the index of the character.

5 0
3 years ago
Other questions:
  • Which of these port transmits digital video
    12·2 answers
  • The Change Speed command in Audacity lets you change which two things about a track at the same time?
    9·1 answer
  • EXCEL 2016:
    8·2 answers
  • Create an array of 7 words,named "temperatures"containing daily temperatures for a week. Temperatures can be positive or negativ
    9·1 answer
  • 2. What is the name for an action performed by the VR Robot?
    7·2 answers
  • Write a method called removeHighPrice that will go through a provided ArrayList called prices and removes the first price that i
    6·1 answer
  • Choose all stages of the information processing cycle.
    12·2 answers
  • A list is sorted in ascending order if it is empty or each item except the last one is less than or equal to its successor.
    14·1 answer
  • What is a cpu in full explanation?
    7·2 answers
  • : Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!