1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
12

The sequence of instructions performed to execute one program instruction

Computers and Technology
1 answer:
Feliz [49]3 years ago
3 0

Answer:

The CPU. The CPU is the heart of the computer. A program is a sequence of instructions stored in main memory. When a program is run, the CPU fetches the instructions and executes or follows the instructions.

Explanation:

hope you get ur answer

......

You might be interested in
good information is characterized by certain properties. List and explain these characteristics of good information​
Gelneren [198K]

Answer:

here is your ans

Explanation:

Characteristics of good quality information can be defined as an acronym ACCURATE. These characteristics are interrelated; focus on one automatically leads to focus on other.

Accurate

Information should be fair and free from bias. It should not have any arithmetical and grammatical errors. Information comes directly or in written form likely to be more reliable than it comes from indirectly (from hands to hands) or verbally which can be later retracted.

Complete

Accuracy of information is just not enough. It should also be complete which means facts and figures should not be missing or concealed. Telling the truth but not wholly is of no use.

Cost-beneficial

Information should be analysed for its benefits against the cost of obtaining it. It business context, it is not worthwhile to spend money on information that even cannot recover its costs leading to loss each time that information is obtained. In other contexts, such as hospitals it would be useful to get information even it has no financial benefits due to the nature of the business and expectations of society from it.

User-targeted

Information should be communicated in the style, format, detail and complexity which address the needs of users of the information. Example senior managers need brief reports which enable them to understand the position and performance of the business at a glance, while operational managers need detailed information which enable them to make day to day decisions.

Relevant

Information should be communicated to the right person. It means person which has some control over decisions expected to come out from obtaining the information.

Authoritative

Information should come from reliable source. It depends on qualifications and experience and past performance of the person communicating the information.

Timely

Information should be communicated in time so that receiver of the information has enough time to decide appropriate actions based on the information received. Information which communicates details of the past events earlier in time is of less importance than recently issued information like newspapers. What is timely information depends on situation to situation. Selection of appropriate channel of communication is key skill to achieve.

Easy to Use

Information should be understandable to the users. Style, sentence structure and jargons should be used keeping the receiver in mind. If report is targeted to new-comer in the field, then it should explain technical jargons used in the report.

4 0
3 years ago
How many bytes are in 1 kilobyte of storage
topjm [15]

Answer:

1000

Explanation I SEARCHED IT Up

5 0
4 years ago
When on a LAN switch DHCP snooping is configured the networks that can be accessed by which clients?
kompoz [17]

Answer:

The network is accesible just for the whitelisted clients configured in the switch connected to the DHCP server

Explanation:

DHCP snooping main task is to prevent an unauthorized DHCP server from entering the our network.

Basically, in the switch we define the ports on which the traffic of the reliable DHCP server can travel. That is, we define as “trust” the ports where we have DHCP servers, DHCP relays and trunks between the switches.

8 0
4 years ago
Need help to answer this question​
valina [46]

Answer:

D. The sun

Explanation: Illuminated objects are objects that are capable of reflecting light to our eyes. The sun is an example of a luminous object, while the moon is an illuminated object.

3 0
3 years ago
Read 2 more answers
Create an array of doubles to contain 5 values Prompt the user to enter 5 values that will be stored in the array. These values
Gre4nikov [31]

Solution :

$\#$include $$  

$\#$include $$    

void parse$\_$name($char \ full[]$, char first$[],$ char last$[])$

{

// to_get_this_function_working_immediately, _irst

// stub_it_out_as_below._When_you_have_everything_else

// working,_come_back_and_really_parse_full_name

// this always sets first name to "Noah"

int i, j = 0;

for(i = 0; full[i] != ' '; i++)

  first[j++] = full[i];

first[j] = '\0';  

// this always sets last name to "Zark"

j = 0;

strcpy(last, full+i+1);

// replace the above calls with the actual logic to separate

// full into two distinct pieces

}

int main()

{

char full[40], first[20], last[20];

double hours[5];

// ask the user to enter full name

printf("What is your name? ");

gets(full);

// parse the full name into first and last

parse_name(full, first, last);

// load the hours

for(int i = 0; i < 5; i++)

{

   printf("Enter hours for day %d: ", i+1);

   scanf("%lf", &hours[i]);

}

// create the time card

FILE* fp = fopen("timecard.txt", "w");

fprintf(fp, "First Name: %s\n", first);

fprintf(fp, "Last Name: %s\n", last);

double sum = 0.0;

for(int i = 0; i < 5; i++)

{

   fprintf(fp, "Day %i: %.1lf\n", i+1, hours[i]);

   sum += hours[i];

}

fprintf(fp, "Total: %.1f\n", sum);    

printf("Timecard is ready. See timecard.txt\n");

return 0;

}

3 0
3 years ago
Other questions:
  • Without a(n) ____, a computer cannot function.
    8·2 answers
  • Using a graphic organizer in the prewriting can do all of the following except what?
    9·1 answer
  • A computer "nibble" consists of four "bits," each bit being either a 0 or a 1. If characters are represented using a code that u
    12·1 answer
  • You have two DCs, each with three Active Directory-integrated zones. You're getting inconsistent DNS lookup results and suspect
    8·1 answer
  • Techniques that shape material without removing material.​
    6·1 answer
  • You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
    5·1 answer
  • A histogram titled Greeting card sales has date on the x-axis and cards (millions) on the y-axis. January is 1 card, February: 1
    12·2 answers
  • Micheal is the project manager in a company. He wants his organization to use technology for higher revenue and productivity. Wh
    13·1 answer
  • Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.
    8·2 answers
  • Your son is complaining that his smartphone is broken. He tells you that he cannot connect to the internet, nor can he make or r
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!