1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
12

What is the difference between a programming language and natural (every-day) language?

Computers and Technology
1 answer:
marta [7]3 years ago
8 0

Answer:

Explanation:

Natural languages are used for communication between people and programming languages enable human to interact with machines.

You might be interested in
What are different social phenomenas are you aware of that used part of a social movement, change, or cause
marin [14]

Answer:

Social change in the broadest sense is any change in social relations. Viewed this way, social change is an ever-present phenomenon in any society.

Explanation:

7 0
2 years ago
When i try to add a module into a device, packet tracer pop-ups a warning message saying "cannot add a module when the power is
Gre4nikov [31]
Save all your important pictures documents on a flash drive or cd but what ever you do remember to save it on icloud.com so you have a back up and reseat your  computer
8 0
3 years ago
Business cards are generally designed so that this item stands out the most.
Sloan [31]
The D. Company Name most likely stands out on a business card with an address or such in smaller font below. A logo does nothing for a business card if a potential customer doesn't even know the name of the business. While logo's are often present on a business card, the company name is far more crucial to enunciate clearly which is of course, important for business's attraction of new customers.

So D. Company Name is my final answer!

Hope this helps! ;)
3 0
3 years ago
Which of the following domains do NOT need software vulnerability assessments to mitigate risk from software vulnerabilities?A.
aliya0001 [1]

Answer:

I dont think that these four do not need because When we are discussing risk management, you can examine domains separately. Each domain represents a specific target. Some attackers have the skill they focus on the User Domain. Other attackers may be experts in particular applications, so they focus on the System/Application Domain. Similarly LAN and Workstation Domain.

Explanation:                                                        

When a threat exploits a vulnerability it is a loss. The impact determine the severity of the loss. A threat is  potential to cause a loss.  Threat as any activity  represents a possible danger. Threats  cannot be destroyed, but they  controlled. Threats have independent probabilities.For example, an attacker  attacking Web servers hosted on Apache. There is a company that can stop this attacker from trying to attack. A company can reduce or eliminate vulnerabilities . Threats are  exploit vulnerabilities that result in the loss of confidentiality, integrity, or availability of a business asset. In other words, risks to confidentiality, integrity, or availability represent potential loss to an organization. Because of this, a significant amount of risk management is focused on protecting these resources.            

           

5 0
4 years ago
Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number
lord [1]

Answer:

C

Explanation:

I believe this is because you cannot represent the number sixteen with only four binary bits. The highest you can go is 15.

8 0
3 years ago
Other questions:
  • Sometimes a virus will disable a system’s antivirus protection or add exceptions which prevent its being detected. Running an an
    13·1 answer
  • How do humans acquire voltage in their bodies
    8·1 answer
  • A bowl contains 20 candies; 15 are chocolate and 5 are vanilla. You select 5 at random. What is the probability that all 5 are c
    6·2 answers
  • Which type of market are you in if your firm, along with three other firms, controls 95% of the total music industry?
    13·1 answer
  • Prompt the user for a character and the height of a right triangle. Then, print a triangle of that height using the character en
    11·1 answer
  • A large lens can be very heavy and can only be supported at the_______.
    13·1 answer
  • Monica needs to work on a document where she has to highlight topics in bold and add emphasis to some words in a paragraph using
    9·1 answer
  • Command-based operating systems include
    7·1 answer
  • In which view are fields set up in MS Access?
    11·2 answers
  • Which printing options are available in the Print menu? Check all that apply.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!