1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ede4ka [16]
3 years ago
8

Example of language processor software

Computers and Technology
1 answer:
Anestetic [448]3 years ago
4 0

Answer:

A fortran

Processor and COBAL processor

You might be interested in
True or False? To use a C++ library function, you must use an #include directive to include the appropriate header file.
lakkis [162]

Answer:

True

Explanation:

While programming in most programming languages, one will have need to use functions and variables defined in other class libraries. in C++, these functions and variables' definitions are contained in Header files, which can be imported and used into any C++ program by using the pre-processor #include statement. This statement is the equivalent of import in java and copy in other languages. Popular header files are the Maths class (Allows use of maths functions like power, square roots exponentiation etc), the input/output (allows usage of cout print statement and cin input statement)

7 0
3 years ago
A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to w
gtnhenbr [62]

Answer:

The correct answer to the following question will be Option C (The application was not developed to react to changes to the gyroscope).

Explanation:

  • Most of the android devices are enabled with the sensors. Gyroscope is one of them, it rotates the screen accordingly.
  • When the user launches an application on the tablet he or she turns the tablet but the screen doesn't rotate accordingly because the application or software is not enabled to rotate accordingly with the gyroscope. 
  • By measuring the rate of turn around one particular axis, the gyroscope maintains its level of effectiveness. When the rotations around an aircraft's roll axis are measured, an actual value is determined until the object stabilizes.
8 0
3 years ago
Write a for loop that will print the values 1 to 20 while skipping the odd numbers (2,4,6,8,10,12,14,16,18,20):
DochEvi [55]

<u>Answer:</u>

<em>void main ( )  </em>

<em> {  </em>

<em> int counter;  </em>

<em>  cout<<""Even numbers between 1 to 20 are:""<<endl ;  </em>

<em> //Method 1 </em>

<em>  for (counter = 1; counter <= 20; counter++)  </em>

<em>  {  </em>

<em>    if ( counter%2 == 0)  </em>

<em>   {   </em>

<em>     cout<<counter<<""\t""<<endl ;  </em>

<em>   }  </em>

<em>  }  </em>

<em>//Method 2 – simplest one </em>

<em>for (counter = 2; counter <= 20;)  </em>

<em>  {  </em>

<em>     cout<<counter<<""\t""<<endl ;  </em>

<em>counter = counter + 2; </em>

<em>    </em>

<em>  } </em>

<em> </em>

<em>  return 0;  </em>

<em>} </em>

<u>Explanation:</u>

In this, Method 1 runs a for loop and check whether each number is divided by 2. If yes, then printed otherwise it is skipped.

In the second method, it runs for loop only for even numbers. <em>This is obtained by incrementing the counter by 2. </em>

6 0
3 years ago
Jack is using a document that has multiple references to his company as Company ABC, LLC. He would like to change these values t
Alinara [238K]

Copy the text you want to use as a replacement and use the Find dialog box to find each value to paste the replacement text.

Explanation:

4 0
3 years ago
Read 2 more answers
What happens as the key length increases in an encryption application?
pashok25 [27]
<span>The answer is : Increasing the key length of DES would  protect it against brute force attacks.  </span>Brute force is when the attacker tries every key knowing that one will eventually work.  <span>Key length increase proportionally increases the key space,  having a keyspace l</span>arge enough that it takes too much time and money to accomplish a brute force attack.
6 0
3 years ago
Other questions:
  • When troubleshooting firewalls, which of the following is not something you should do after you attempt a fix?
    7·1 answer
  • The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interl
    12·1 answer
  • Which tab in the Tasks view is used to modify the Current View?
    11·2 answers
  • What is the difference between Sleep and Shut Down?
    7·1 answer
  • You have been asked to create a query that will join the Production.Products table with the Production.Categories table. From th
    6·1 answer
  • Write a program that displays a menu allowing the user to select air water, or steel. After the user has made a selection, the n
    10·1 answer
  • The information that’s displayed in a datalist control is defined by _____.
    10·1 answer
  • Anyone can give me the definition of specification ?
    10·2 answers
  • Coding with Loops Worksheet
    12·2 answers
  • Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!