1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
2 years ago
15

Comments should

Computers and Technology
2 answers:
notsponge [240]2 years ago
4 0

Answer:

c.

Explanation:

suter [353]2 years ago
3 0

Answer:

Correct answer is:

communicate the purpose of the code that follows it.

Explanation:

Let have a look at each option

comment should give the reader the background of the programmer.

Comments are unable to do so.

Be written on every line

No, it is not need as comment are useful only to explain difficult or complex part of code.

communicate the purpose of the code that follows it.

yes, this option is true, as comments will give hints to programmer about the piece of code.

give information about how many hours it took to write the code

No, comments can answer it,

You might be interested in
Which of the following BEST describes an extranet?
zimovet [89]

Answer:

D. an Internet connection allowing outsiders limited access to a firm's internal information system

Explanation:

An extranet is a private network that allows partial access to a company's network to partners, services providers, and selected customers. It provides a secure way of information exchange between the business and its stakeholders. An extranet is comparable to a Demilitarized Zone (DMZ) in that it gives authorized parties access to needed services but not the whole network.

8 0
3 years ago
Cloud resources are​ ________ because many different organizations use the same physical hardware.
Lady bird [3.3K]
<span>Cloud resources are​ pooled because many different organizations use the same physical hardware. they share that hardware through virtualization. The elastic leasing of pooled computer resources over the internet. There are four types of clouds. The types of clouds can be categorized by their altitude or by how they have formed. Different categories include low level, mid level, and high level. There is also a category for those that have developed vertically.</span>
7 0
3 years ago
Which program or security application prevents access between a private and trusted network, and other untrusted networks?
zavuch27 [327]

The answer is a firewall. A firewall is capable of blocking unwanted and/or unauthorized connections from accessing either your computer or your entire network thereby resulting in data loss and information theft.

7 0
3 years ago
Read 2 more answers
Under extreme programming, ________ and ________ are intimately related parts of the same process
Inessa05 [86]
The answer to this question is: coding and testing
Extreme programming is a software development methodology that aim to improve software quality by measuring whether the technology can be used to fulfill customer's requirement.
To actually get somethings that is accepted by the customers, various coding and testing the software will be done constantly
8 0
3 years ago
Read 2 more answers
The communication channel used in IMC must rev: 12_06_2018_QC_ CDR-223 Multiple Choice match the traditional channel used in tha
Setler [38]

Answer:

connect the sender with the desired recipients.

Explanation:

Integrated Marketing Communication (IMC) is a process through which organizations create seamless branding and coordination of their marketing and communication objectives with its business goals and target audience or consumers. The communication tools used in IMC are both digital and traditional media such as billboards, search engine optimization, magazines, television, blog, radio, webinars etc.

The communication channel used in IMC must connect the sender with the desired recipients.

The receiver is any individual who is able to read, hear or see and process the message being sent or communicated in the IMC communication process. Any interference the IMC communication process is known as noise.

An organization can analyze and measure the effectiveness of the IMC communication process by considering market share, sales, and customer loyalty.

5 0
2 years ago
Other questions:
  • In the database below, the arrow is pointing to a _____.<br> file<br> record<br> field<br> key field
    12·1 answer
  • In the year of our Lord 66, the Emperor Nero, being at that time in the twenty-ninth year of his life and the thirteenth of his
    10·1 answer
  • Which registry hive is loaded first during windows startup?
    5·1 answer
  • How does an agile team maintain requirement?​
    9·2 answers
  • Name the different type of vegetation found in India ?​
    8·2 answers
  • If you wanted to have wireless connectivity in your home or​ apartment, you would need a​ _________________ to move packets of d
    11·1 answer
  • What is the difference between amplifier and the repeater?
    11·1 answer
  • The chief intellectual property officer (CIPO) is responsible for collecting, maintaining, and distributing the organization's k
    14·1 answer
  • Which properties would be useful to know to search for a Word document? Check all that apply.
    7·1 answer
  • As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!