1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lora16 [44]
3 years ago
15

__' the low level language? a.machine and assembly c.3G and 4G d.machine and 4gl​

Computers and Technology
1 answer:
ioda3 years ago
7 0

Answer:

a. machine and assembly.

Explanation:

An instruction set architecture (ISA) can be defined as series of native memory architecture, instructions, addressing modes, external input and output devices, virtual memory, and interrupts that are meant to be executed by the directly.

Basically, this set of native data type specifies a well-defined interface for the development of the hardware and the software platform to run it.

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Machine and assembly are referred to as the low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans. Also, assembly language use commands written in English such as SUB, MOV, ADD, etc.

On the other hand, a high level language can be defined as a programming language which is generally less complex than a machine (low level) language and easy to understand by the end users (programmers).

This ultimately implies that, a high level programming language is typically a user friendly language and as such simplifies coding or programming for beginners.

Some examples of high level programming language are Python, Java, C#, Ruby, Perl, Visual Basic, PHP, Cobol, C++, Fortran, Javascript, etc.

You might be interested in
From a neural network with 11 input variables, one hidden layer with three hidden units, and one output variable, how many param
e-lub [12.9K]

Answer:

40

Explanation:

Given that:

A neural network with 11 input variables possess;

one hidden layer with three hidden units; &

one output variable

For every input, a variable must go to every node.

Thus, we can calculate the weights of weight with respect to connections to input and hidden layer by using the formula:

= ( inputs + bias) × numbers of nodes

= (11 + 1 ) × 3

= 12 × 3

= 36 weights

Also, For one hidden layer (with 3 nodes) and one output

The entry result for every hidden node will go directly to the output

These results will have weights associated with them before computed in the output node.

Thus; using the formula

= (numbers of nodes + bais) output, we get;

= ( 3+ 1 ) × 1

= 4 weights

weights with respect to input and hidden layer total = 36

weights with respect to hidden and output layer total = 4

Finally, the sum of both weights is = 36 + 4

= 40

6 0
3 years ago
Did the first generation of computers use microprocessors.
Katena32 [7]

no they used standard 8088 Intel processors

hope this helps

8 0
2 years ago
Read 2 more answers
he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do
Kamila [148]

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

  • Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software.
  • It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.
  • Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.
7 0
3 years ago
Brandack is a leading manufacturer of storage devices. During a span of every five years, it produces one high-performance stora
Ede4ka [16]

Answer:

S-curve pattern of innovation

Explanation:

Based on the information being provided with regards to Brandack's business it seems that this scenario best illustrates the S-curve pattern of innovation. This is a pattern that describes a the slow rise as a new product enters the market, followed by a rapid increase in profit as the product enters it's maturity stage, and finally a constant decline in profit as it approaches the end of it's life cycle. Usually occurring when a new or updated version of the product is being introduced into the market. Which for Brandack is every five years.

If you have any more questions feel free to ask away at Brainly.

3 0
3 years ago
A user contacted you to report that an unwanted Windows application is launched each time her computer is booted. How can you pe
nikklg [1K]

Answer:

Uninstall the application.

Explanation:

When a program or a computer application constantly launches by itself each time your system is booted, the best and most effective solution is to uninstall the application.

Uninstalling an application entails removing the application entirely from your device.

3 0
4 years ago
Other questions:
  • Several steps are involved in creating a presentation. what is the last step in the process before preparing to presenting it?
    12·1 answer
  • 2a
    8·1 answer
  • Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
    12·1 answer
  • Write the difference between:
    14·2 answers
  • Where is voice data stored in Android?
    11·1 answer
  • Last bittttt of points
    8·1 answer
  • Which statement describes Augmented Reality (AR) technology?
    12·1 answer
  • What is suitable equipment to meet customer needs from
    10·1 answer
  • During an IFR flight in IMC, you enter a holding pattern (at a fix that is not the same as the approach fix) with an EFC time of
    12·1 answer
  • When you type information into a document property field on the cover page, Word does not automatically add this information to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!