1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
2 years ago
9

Putting commands in correct order so computers can read the commands

Computers and Technology
1 answer:
lana66690 [7]2 years ago
8 0

Answer:

its b I think I'm pretty sure

You might be interested in
Assume that a single page of printed text requires 52 lines of text, and that each line of text averaged 80 characters. If each
zysi [14]

Answer:

4160000 bytes

Explanation:

One page = 52 lines of text

One line of text = 80 characters

=> One page = 80 x 52 = 4160 characters

Therefore, 500 pages of text will have 4160 x 500 characters = 2080000 characters.

Since 1 character takes up 2 bytes of computer memory, it impleies that a 500 page novel will take up 2080000 x 2 bytes = 4160000 bytes.

5 0
3 years ago
What security principle does a firewall implement with traffic when it does not have a rule that explicitly defines an action fo
NemiM [27]

Answer:

Implicit deny

Explanation:

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

When a firewall encounters a traffic it does not have a rule that explicitly defines an action for that communication, it implicit deny.

7 0
3 years ago
Cisco's acquisition of Pure Digital, makers of the Flip video camera line, was largely considered a flop because comparable tech
juin [17]

Answer:

True

Explanation:

8 0
3 years ago
Read 2 more answers
A programmer wants to write a procedure that calculates the net elevation - total number of feet a traveler goes up and down. Fo
ch4aika [34]

Answer:

Pseudocode

////////////////////////////////////////////////////////////////////////////////////////////////////////////

Integer netElevation(list of elements of type elevation - type and number)

<em>function open</em>

   Define running total = 0

   for each element from list

   <em>loop open</em>

       elevation type = element[i].type

      if (elevation type == Up)

           running total = running total + element[i].number

       else

           running total = running total - element[i].number

   <em>loop close</em>

   return running total

<em>function close</em>

3 0
3 years ago
Hen pointing to a tool on the ribbon, a ______ appears, displaying information about the tool.
expeople1 [14]
Enhanced ScreenTip

When pointing to a tool on the ribbon, an Enhanced ScreenTip appears, displaying information about the tool.
5 0
3 years ago
Other questions:
  • With a _____ network connection, the computers and other devices on the network are physically connected via cabling to the netw
    13·1 answer
  • True/False: When you make a function call, the order of the arguments you send does not matter as long as the number of argument
    15·1 answer
  • Write the definitions of two classes Day and Night. Both classes have no constructors, methods or instance variables. Note: For
    8·1 answer
  • Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an in
    13·2 answers
  • Write a program that asks the user for the name of a text file. the program should display the last 10 lines of the file on the
    13·1 answer
  • Elizabeth types in the following search terms: "Adoption AND cats AND NOT Persians." what results will her search provide?
    12·2 answers
  • What information should be included in the closing paragraph of a thank-you letter? a. Mention skills that were omitted during t
    6·2 answers
  • Which of these image sizes takes the most storage space?
    8·2 answers
  • Define a function typeHistogram that takes an iterator ""it"" (representing a sequence of values of different types) and builds
    12·1 answer
  • Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion dete
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!