1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
meriva
3 years ago
8

The process that converts program code into machine language is called

Computers and Technology
1 answer:
Elena L [17]3 years ago
4 0

Answer:

"Compilation" is the correct answer.

Explanation:

You might be interested in
Whats happens when you add the numbers 1 and 1 together (1+1)<br> 11<br> 32<br> 2<br> 9
Neko [114]

Answer:

2

Explanation:

The mathematical answer would be 2. To get 11, one would simply put the 1's next to each other but there is an addition symbol. 32 is an irrational number to think of for an answer because there are no other numbers to add or multiply with the 1's to achieve 32. 9 is also irrational for the same reason.

6 0
2 years ago
Write a new function called "listmax" based on the following IPO # function: listmax # INPUT: a list # PROCESSING: obtains the l
hammer [34]

Answer:

See Explaination

Explanation:

def listmax(lst):

largest = None

for num in lst:

if largest is None or num > largest:

largest = num

return largest

mylist = [10, 20, 30]

x = listmax(mylist)

print(x)

5 0
3 years ago
Compare and contrast between first and second generation of computer<br>​
noname [10]
Frist gen of computers took forever to load and would crash if someone els in the house picked up the phone now adays are computers are in our pockets. There our phones and they rarely if ever crash
8 0
3 years ago
To provide both encryption and integrity protection, wpa2 uses aes encryption with:
lara [203]

WPA 2 stands for Wi-Fi Protected Access, version 2. It is the latest protocol that effectively protects 802.11 wireless traffic across a LAN. It belongs to the 802.11 protocol.

To provide both encryption and integrity protection, wpa2 uses aes encryption with Counter and CBC MAC (CCM) Mode.

3 0
3 years ago
The         provides access to the Internet; may also be internal
grin007 [14]
The TCP/IP protocol provides access to internally and externally I.e. The internet.
3 0
4 years ago
Other questions:
  • True or False: Unity can apply multiple textures to a single object or terrain
    9·1 answer
  • What do vector handles point at?
    13·2 answers
  • Write a java program which uses methods for calculating the sum of any 5 non-zero integer digits that are input. The program mus
    8·1 answer
  • Enzymes_____________.
    7·1 answer
  • What development in operating systems happened between the years 1990 and 2000?
    15·1 answer
  • You wish to lift a 12,000 lb stone by a vertical
    7·1 answer
  • Two technicians are discussing a parasitic load test. Technician A says that the parasitic load is measured with an ammeter Tech
    13·1 answer
  • A good machine should have the mechanical advantage of......?​
    7·1 answer
  • Which excel feature prevents you from having to type the same thing over and over?
    10·1 answer
  • Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is contained in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!