1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paha777 [63]
3 years ago
9

Critical Thinking Questions

Computers and Technology
2 answers:
djyliett [7]3 years ago
7 0

Answer:

Un lenguaje de programación es un lenguaje formal (o artificial, es decir, un lenguaje con ... Todo esto, a través de un lenguaje que intenta estar relativamente próximo al lenguaje ... Artículo principal: Historia de los lenguajes de programación ... cada una representando lenguajes de programación surgidos en una época ...

Explanation:

siniylev [52]3 years ago
5 0

Answer:

I only have three answered but I hope this helps.

Explanation:

1. You learned that there are many different programming languages, just like there are many different spoken languages throughout the world. And programming languages have certain syntax, or rules, they have to follow in order for the computer to understand the commands. Give one example of syntax for one of the programming languages listed in the unit. Then give two examples of syntax from a language you know. Describe what will happen if you do not follow these rules in your language.

In python, when we declare a float or an integer, we declare like this:

a=2 for int

b=2.0 for float

4. Why would a programmer use a flowchart?

Programmers use flowcharts because the help the programmer see where the data will end up. Flow charts help programmers figure out where a potential problem area is and helps them with debugging or cleaning up code that is not working.

5. Finish identifying the data types of each of the following pieces of data:

Data Data Type

“Hermione” String

13.5 Float

-6 Integer

“18 Mingle Lane” String

False Boolean

-20.4 Float

“Bonjour” String

12345 Integer

You might be interested in
To create an identical version of a slide you would click
Tresset [83]
You would click clone
3 0
4 years ago
Read 2 more answers
Which of the following is not a concern that has come out of the widespread adoption of the Internet?
slamgirl [31]

Answer:

The correct option is;

Selecting the correct browser to use for the sites you want to visit

Explanation:

Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient

Increased anonymity

Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.

Unauthorized sharing of copyrighted information

The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online

Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.

5 0
3 years ago
Which of the following is NOT a factor of identifying graphic design?
kolezko [41]

Answer:

i think it is a

Explanation:

sorry if it is wrong

4 0
3 years ago
Read 2 more answers
In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
Neporo4naja [7]

Script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

<h3>The types of threat actors.</h3>

In cybersecurity, there are different types of threat actors and these include the following:

  • Script kiddie
  • Gray hat hacker
  • Hacktivists

One of the ways to differentiate an attack orchestrated by a script kiddie from that of a gray hat hacker is that script kiddie use automated attack software created by other hackers for access while gray hat hackers create their own attack software to show vulnerabilities.

Read more on cybersecurity here: brainly.com/question/14286078

#SPJ1

4 0
2 years ago
408 request timeout your browser didn't send a complete request in time
Alik [6]
<span>408 Request Time out error messages are often customized by every website. These messages are especially for large websites that take long time to process itself.
</span>
<span /><span>Causes for these messages:
The 408 Request Timeout error is an HTTP status code that says that your request is not send to the server in the given time. In other words, your website connection is “timed out”
</span>


6 0
4 years ago
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • Marco makes $65,000 a year as a graphic designer. He makes a charitable donation of $1,000 each year. He also has $5,000 of busi
    12·2 answers
  • In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
    13·2 answers
  • A device which lets you interact with the computer
    6·2 answers
  • In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the
    11·1 answer
  • What is this app for ?
    10·2 answers
  • On a scale of 1-10 how would you rate your pain
    12·1 answer
  • Please help 2 lazy to do! easy question
    10·1 answer
  • Trong mạng internet, chúng tôi thay đổi công nghệ mạng LAN sang một công nghệ
    5·1 answer
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!