1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tester [92]
3 years ago
7

Which term best describes these lines?

Computers and Technology
1 answer:
Harrizon [31]3 years ago
8 0
The term best describing these lines is called pseudocode. Essentially a “text-based” detail (algorithmic) design tool.
You might be interested in
Using complete sentences post a detailed response to the following.
lesya [120]

Answer:

an interest group

Explanation:

When designing a video game I believe that the best target group would be an interest group. Focusing on a specific interest group will allow you to design a game, knowing that there are people truly passionate about that interest and who will play the game. Targeting an age group makes things difficult because you have to limit your creativity to that age group and even still there may not be much interest in that age group for your category of game. Therefore, an interest group is the best option and gives you the freedom to unlock your creativity without having to limit your game due to age concerns.

7 0
3 years ago
Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
Len [333]

Answer:

white-hat hacker

Explanation:

The white-hat hacker is also called as ethical hacking. The white hat hacker is the security of the computer in an ethical manner by some experts it specializing in system testing and other test modules of computer is to ensure the security of the information security of an organization.

As Matt is a  developer for protecting the Cyber in a company The Matt creates secure management information systems. it divides the new task into the computer So Matt is a white-hat hacker in that organization

4 0
3 years ago
Please help me please please
Leya [2.2K]
The light is shining on the left side of his face because the shadow is on the other side
6 0
2 years ago
Read 2 more answers
Why is a class called a factory of objects
zhenek [66]

Explanation:

A class is called an object factory because objects are created from a class. An object is an instance of a class.

4 0
3 years ago
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
Other questions:
  • Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their
    14·1 answer
  • In evaluating the precedence rules used by Python, what statement is accurate? a. Addition and subtraction are evaluated after a
    8·2 answers
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    5·2 answers
  • What do you do to add a line or circle to your presentation?
    7·2 answers
  • The greatest common divisor of integers x and y is the largest integer that evenly divides into both x and y. Write a recursive
    7·1 answer
  • What is copy and paste?
    13·2 answers
  • Which of these trade-offs occur in a memory hierarchy?
    15·1 answer
  • Helllllllllppppppppppp
    9·1 answer
  • GIVING OUT BRAINLIEST AND I AM ALSO WARNING EVERYONE TO NOT ANSWER A BUNCH OF rubbish just to get the points!
    7·2 answers
  • the ghost adventures team uses a variety of tools and technology in investigations. which one is described as an adjustable freq
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!