1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
11

A ____________ is a collection of commands given a name.

Computers and Technology
1 answer:
Volgvan3 years ago
6 0

Answer:

a for apple b for ball c for cat d for dog e for elephant f for exam exam exam exam exam is coming broglie read silently you why are you asking us your homework you have to write why are you asking as bye bye see you once again Tata in next video please like share comment our channel you get 30

You might be interested in
_________ Code that you write is called primary code, and code that the compiler produces after processing the primary code is c
Kazeer [188]

Answer:

The correct answer for the given question is  "source code"

Explanation:

When you writing a code in any programming language that code is known as  source code.The source code is also known as primary code, when source code is compiles it produce runtime code.

The source code is created by the compiler it can be easily understood by the human being.

for example in c language we write a source code after compilation it produces object code .

5 0
4 years ago
List two functions of the UPS​
Alja [10]

Answer:

To protect equipment in the event of power-cut

To ensure stable supply of current (protects against surges)

Explanation:

4 0
3 years ago
Your computer is crashing on a regular basis. Which of the following is an operation available to the user that should help rese
Neko [114]

Answer

System restore

Explanation

System restore is a recovery feature that helps restore your system to the previous condition or point. Most computers have system restore disks which are an advantage to the users especially when the computer clashes.These disks are very effective when it comes to restoring the system to its initial state.

6 0
3 years ago
Read 2 more answers
A __________ tries to break it security and gain access to systems with no authorization, in order to prove technical prowess.
Goshia [24]
Black-hat hacker is the answer. Hope this helps.
6 0
3 years ago
I need someone to help me like rnnnnn please
nevsk [136]

.send me 1000 ruppes i will answer each and every question you send send 1000 ruppes to this number 93257 50999

6 0
3 years ago
Other questions:
  • What special precautions should you take when detailing a steel-framed building to avoid excessive conduction of heat through th
    9·1 answer
  • my headphone jack that is like in the computer will not work only my speakers will work when i plug in
    15·2 answers
  • a. Create an Abstract class called Vehicle with abstract methods accelerate, stop, and gas, & data of your choice (5 marks)
    12·1 answer
  • What kind of skills does an electronics engineering tech need as requirement in the workplace?
    6·1 answer
  • The space where text and content is entered and positioned for onscreen reading or printing
    8·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • Which action does not happen in each iteration of the repeat loop in the
    9·1 answer
  • User 2.0 is most likely to Multiple Choice passively read and search for content. depend on content creators and avoid expressin
    5·1 answer
  • What controls can be found on the File tab of Microsoft PowerPoint? Check all that apply. Help Print Track Open Insert Save
    12·1 answer
  • Evaluation, formatting, expanding/decoding, distillation/reduction, and assessment are examples of ________ computing operations
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!