1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marishachu [46]
4 years ago
8

What is the name of the program that takes high-level code and transforms it into machine-level code?

Computers and Technology
1 answer:
Olenka [21]4 years ago
5 0
These are known as compilers. They take high level software like java and translates it into simple code like binary.
You might be interested in
What is the final amount stored in value if the computer selects 17 as the
nadya68 [22]

Answer: -17

Explanation:

Our random number is 17. Let's go through line by line.

  1. value is a random number picked which is 17
  2. valueB = 17 / 2 = 8.5
  3. If value is greater than 0 AND value has a remainder of 1, we will set the value to value* -1.
  4. Value is now 17 * -1 = -17

Let's quickly calculate value mod 2. 17 % 2 = is 1. If you're wondering how we did that, the remainder after dividing 8 into 17 twice is 1, because 17 - 16 = 1.

We stop after line 4 because we stop the conditional statement after one condition is filled.

6 0
3 years ago
At the monthly product meeting, one of the Product Owners proposes an idea to address an immediate shortcoming of the product sy
Mrrafil [7]

Answer:

Correct limitation for Attribute Name and value is option

b: Value and name combined must not exceed 400KB

Explanation:

For amazon dynamo db You can have unlimited attribute per item but one attribute cannot exceed 400 kb in size.400Kb is the limit of an item which can be stored in db.

If bigger data is required to store than data is stored some where and links/url to data are stored in the db.

For Item max size is 64KB

7 0
3 years ago
Firewalls are categorized into two; namely hardware firewall and software firewall. Identify the correct statement for a softwar
garri49 [273]

Answer:

Option (d) Software firewall is placed between the normal application and the networking components of the operating system

Explanation:

  • Software Firewalls protect the computer from trojans and malicious content which can arise from unsafe applications.
  • It also protect the computer from external network.
  • It filters the data to and from a software application in the desktop.
  • It also filters the data to and from a network.
  • It safeguards the computer from not loosing access to the attackers.
  • It is customizable software and has to be monitored like installing updates and storage spaces etc.
  • Software Firewall in conjunction with the Hardware Firewall must be used for the security of the desktop and the networks.
5 0
3 years ago
What is the output of the program?
Sergio [31]

Answer:

the output of the above program is

2 3

3 5

8

Explanation:

It seems the program is trying to pair two numbers into one and leaving the unpaired number (in a case of odd number of numbers) as a separate output.

This is why numbers 2 and 3 form 23, numbers 3 and 5 form 35 and 8 is another output of the program.

5 0
3 years ago
What will be the value of ans after the following code has been executed?
Lesechka [4]

Answer:

Option B 120

Explanation:

There are three variables,<em> ans, x </em>and <em>y</em> given in the code. In beginning, the variable. <em>ans,</em> holds value of 10.  And variable <em>x</em> and <em>y</em> hold value of 65 and 55, respectively. Since the value held by x is bigger than one held by y, the if condition is met and the statement ans = x + y will run. The execution of this statement will total x with y -> 65 + 55 and the initial value of <em>ans is </em>overwritten by the addition result which is 120.

7 0
3 years ago
Read 2 more answers
Other questions:
  • TO COMPUTING IN BUSINE
    14·1 answer
  • 4. What aspect of the initial database planning process would the formula (0 + Pt × 3 + p)/5 be used in?
    5·1 answer
  • What is computer hacking? describe some examples
    6·1 answer
  • What will be the result of running the following code fragment? int year = 0; double rate = 5; double principal = 10000; double
    14·1 answer
  • In online advertising, the term "impression" refers to: the Web site displayed when a user clicks on an advertisement. the measu
    11·1 answer
  • Need the answer for this code hs will give brainly
    7·1 answer
  • Consider a short, 90-meter link, over which a sender can transmit at a rate of 420 bits/sec in both directions. Suppose that pac
    9·1 answer
  • What is the purpose of the domain name system
    15·2 answers
  • Trong mạng internet, chúng tôi thay đổi công nghệ mạng LAN sang một công nghệ
    5·1 answer
  • The internet is controlled by ______
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!