1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
2 years ago
11

Procedural programs specify instructions that a processor must execute to perform computations. These programs sometimes consist

of functions and procedures. Functions perform specific tasks and return values to the main procedure. Procedures do not return values. Programs written using declarative languages consist of inputs and desired outputs without any instructions. Declarative languages are also known as non-procedural languages. Structured Query Language (SQL) is an example of a declarative language.
Computers and Technology
1 answer:
Zarrin [17]2 years ago
7 0

Answer:

hk

Explanation:

You might be interested in
How do you ask brainy a question without it not liking the question and saying it hurts their feelings?
murzikaleks [220]
IM SORRY but i dont now your question

7 0
3 years ago
Pseudocode is a good choice to communicate a____of a process
Margaret [11]

Answer:

1. detailed view

2. segment

Explanation:

1. The Pseudocode is a very good choice to communicate a detailed view of a process. It provides a complete picture of a problem and explains elaborately how that problem is solved using the algorithm. In other words, it elaborately explains the algorithm is simple and concise words and segments to represent different operations of code.  

2. Firstly the Pseudocode uses simple and concise words and segments for representing the different operations of the code. And hence, it is the segment other than the simple and concise words that are being used inside a pseudo code. And the simple and concise word together with the segments forms the complete pseudo-code and clearly explains the algorithm.

7 0
3 years ago
analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
LekaFEV [45]

Answer:

Explanation:

Multinational Companies tend to have millions of users from all over the globe who use their services and in doing so provide their information. This information gets saved on the databases of these companies. It is then up to the company on how they will use this information. This is where ethicality comes into play. A company can act ethically and protect the information that has been entrusted to them by their user, or they can act unethically and use the users' personal data to make profits. It has recently come to light that some companies have been using users' private data and would sell it to other companies for profit. These buying companies would then use the data for a variety of things such as ad targeting and statistics. These companies profited massively and the actual owners of the data did not, which makes this incredibly unethical.

8 0
3 years ago
______ is a disadvantage of EDI.
Artist 52 [7]

Answer:The number of standards

Explanation:Electronic data interchange (EDI)  is the mechanism through which data is interchanged in the system electronically.It is mostly found in the business field for exchanging of data.

As EDI helps in making message accurate by decreasing the length and also has beneficial features of maintaining the security and increasing productivity ,hence these factor are not considered as the disadvantage .

Too many standard present in the EDI make the working complex by limiting the processing in the small business as compared with large organization.

 

6 0
3 years ago
What are the five layers in the internet protocol stack? What are the principal responsibilities of each of these lay?
mariarad [96]

Solution:

The five Layers in Internet protocol stack are:

1.Application Layer  

2.Transport Layer  

3.Network Layer  

4.Link Layer  

5.Physical Layer  

The principal responsibilities of these layers are as follows:

1.Application Layer •Applications with appropriate requirement for user.  

•It is reserved for network applications and their application protocols such as HTTP, SMTP, and FTP etc.  

•Its protocol uses transport layer protocols for establishing host-to-host connection.  

2.Transport Layer  

•It is responsible for End-to-Communication  

•Transport layer transports messages from application layer between client and server of application  

•It uses two protocol for transporting messages: TCP and UDP.TCP provides reliable connection oriented services, while UDP provides connectionless service  

3.Network Layer  

•Network Layer moves packets from one host to destination.

•It has two principal component:IP protocol:-It defines the datagrams and decide how the end system and router will work Routing protocols: these protocols decide the routing path between source and destination. 4.Link Layer  

•It is responsible for link-level communication  

•Link layer receives the data gram from network layer at each node and delivers it to next node, the next node passes the datagram to network layer.so This layer moves entire frames from one network element to adjacent one.

•The service provided by link layer is protocol dependent

5.Physical Layer  

•It provides Physical media

•At each node, it moves individual bits of frames to next node.  


7 0
3 years ago
Other questions:
  • You've formatted the first paragraph of a document. What button can you use to apply the formatting from the first paragraph to
    9·2 answers
  • A senior center would like to add a new computer to their library so that members can check their email and read book reviews
    11·2 answers
  • Indicate the proper order (1-4) of the following PR strategic planning 4-step process. 1 Defining the problem 2 Evaluating the p
    10·1 answer
  • The introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. waterfall effe
    14·1 answer
  • (I need help also can u guys just give me some example just in case I got confuse)
    13·1 answer
  • A _______ template is used to maintain consistency in terms of margins and page numbers .
    6·1 answer
  • If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would y
    7·1 answer
  • What is the main difference between a peripheral device and other types of devices? Choose the best answer.
    12·1 answer
  • Write a program that calculates the average of N integers. The program should prompt the
    12·1 answer
  • Write a function named swapFrontBack that takes as input a vector of integers. The function should swap the first element in the
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!