1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nlexa [21]
3 years ago
15

Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste

ms b. because we can purchase the library routines and install c. all of these choices d. because they can come as part of the compilers and assemblers
Computers and Technology
1 answer:
Licemer1 [7]3 years ago
6 0

Answer:

c. all of these choices

Explanation:

all of them are correct. i took a quiz on this like 2 days ago and that was the answer.

<em>hope this helpsssssssss!!!!!!!!!!! :):):)</em>

You might be interested in
The ____ provides access to the Internet may also be internal.
dmitriy555 [2]
Local area network (LAN)
7 0
3 years ago
Read 2 more answers
Pressing delete removes the character after the insertion point
vekshin1

Answer: yes it does

Explanation:

8 0
3 years ago
Read 2 more answers
Kim agrees. You get the equipment from the truck and begin working. Kim approaches you as you are installing the modem and is a
Angelina_Jolie [31]
Ask your friends if they are doing something wrong with your friends and friends
6 0
1 year ago
Challenge activity 6.1.3 function call with parameters
Kobotan [32]

Answer:

Printing formatted measurement Define a function PrintFeetinchShort, with int parameters numFeet and numinches, that prints using and "shorthand. End with a newline. Ex: PrintFeetinchShort(5, 8) prints: 5' 8" Hint: Use to print a double quote. ра 1 #include <stdio.hu 2 3 / Your solution goes here */ 4 5 int main(void) 6 int userFeet: 7 int user Inches: 8 9 scanf("%d", BuserFeet): 10 scanf("%d", Suser Inches); 11 12 PrintFeet InchShort(userFeet, user Inches); 13 14 return 0; 15) // Will be run with (5, 8), then (4, 11) Run

5 0
2 years ago
Research the design basis threat (DBT) in terms of Cybersecurity for an organization of your choice. Discuss what the Cybersecur
tiny-mole [99]

A Design Basis Threat (DBT) is known to be a characteristics of any given or potential insider and also those of external adversaries, that may try to have or gain unauthorized removal or sabotage, against a physical protection system that was set up designed and evaluated.

<h3>What are Cybersecurity objectives?</h3>

Cybersecurity aims are:

  • To protect computer system,
  • To protect networks,
  • To protect software programs from such cyber attacks.

Note that a lot of digital attacks are targeted at accessing, changing, or deleting sensitive information as well as others.

Learn more about IT from

brainly.com/question/1276995

#SPJ1

3 0
1 year ago
Other questions:
  • What formatting option is easiest to read when printed out
    12·1 answer
  • When did the digital revolution begin
    10·1 answer
  • How do online note-taking tools support students’ academic goals? Check all that apply.
    9·2 answers
  • Task 2 Design a 1st order low-pass filter with cutoff frequency 1kHz, 1) with roll-off and 2) without roll-off. For each filter,
    10·1 answer
  • "The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of message
    6·2 answers
  • The _____ search algorithm searches a list for a given item, starting with the first element and continues to compare the item w
    12·1 answer
  • Carrie is creating a personal balance sheet. The heading includes the period of time that the balance sheet
    11·1 answer
  • Enter key is also known as Return key. (True or false)
    13·2 answers
  • What is a Software that interprets commands drom the keyboard and mouse
    13·1 answer
  • BRIANLIEST!!!!!!!!!!!!!!!!
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!