1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelechka [254]
3 years ago
15

In an executing process, the program counter points __________.

Computers and Technology
1 answer:
ahrayia [7]3 years ago
6 0

Answer:

To the next instruction to be executed and is incremented after each instruction has been executed.

Explanation:

Given that Program counter is a form of record or directory in a computer processor that has the location of the instruction that is currently being executed.

This it does in such a way that, following the execution of each instruction, the program counter increases the number of instructions it stored and immediately points to the subsequent instruction that follows.

Hence, in an executing process, the program counterpoints "To the next instruction to be executed and is incremented after each instruction has been executed."

You might be interested in
When someone asks, Is this information specific enough?, he or she is interested in more _____.
AVprozaik [17]

Answer:

precision

Explanation:

In simple English precise means exact or something specific

5 0
3 years ago
Read 2 more answers
What are the principles of computer programming?
STatiana [176]

The principles of computer programming is, the process of writing, troubleshooting, debugging, and problem solving

3 0
2 years ago
How is the regulation of security and trustworthiness on the Internet likely to develop? Will the private sector improve trust o
andreev551 [17]

The correct answer to this open question is the following.

The regulation of security and trustworthiness on the Internet is likely to develop into more security practices that can guarantee people, the investors, the common citizen, that their information, transactions, and private life are protected. The government has to play a big and key role in demanding companies to install the proper security protocols in their systems in order to protect the information of their clients. Definitely, now more than ever, cybersecurity is a major concern for everybody.

The private sector must improve trust online. Indeed, CEOs of major companies such as Faceb*ok had been questioned by members of US Congress regarding the way they handle private data and they also have questioned that social media site in the long-questioned Russian intervention in the 2016 US elections. Without a doubt, governments have to step in more to have the proper legislation that enforces companies the correct handling of personal data. The public's confidence on the Internet has declined and they are looking for answers in different types of alternatives, including other infrastructures because they are afraid that their personal information could be in hands of people that have different intentions than the simple trade interaction.

6 0
3 years ago
Which icon allows you to add a style to a chart
labwork [276]
Photo shop because you can add any thing or create any thing you want
4 0
4 years ago
Read 2 more answers
A class design requires that a particular member variable must be accessible by any subclasses of this class, but otherwise not
a_sh-v [17]

Answer:

The variable should be marked protected.

Explanation:

When class structure implies that some derived classes of such a class have to control a specific member attribute, but still not that classes which aren't members with a similar package instead. To accomplish this, the variable should be marked with protected because the protected data members are not accessed outside that class in which they are declared.

7 0
3 years ago
Other questions:
  • Is the internet useful and why
    7·2 answers
  • Do I get charged for my brainy membership before or after the 6 months
    8·2 answers
  • Sasha has decided to start a consulting business. She will need space for large meetings and a receptionist. Which of the follow
    14·1 answer
  • The amount you pay your insurer for your insurance plan is which of the following?
    14·1 answer
  • What do you think is the meaning of the saying "Sticks and stones may break my bones, but words can never hurt me"? Do think tha
    5·1 answer
  • Your job is to write a basic blurring algorithm for a video driver. The algorithm will do the following: it will go through all
    11·1 answer
  • Cuales son mis fortalezas como estudiantes
    14·1 answer
  • create a function that draws a certain number of spaces, followed by a certain number of stars, followed by a newline.
    6·1 answer
  • Pls someone help me with these four questions
    8·1 answer
  • Can you guys help me with this coding assignments?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!