1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
il63 [147K]
2 years ago
10

Set of general format used to write program in any programming language?​

Computers and Technology
1 answer:
Novosadov [1.4K]2 years ago
5 0

Answer:

hope you find it right

Explanation:

The process of writing computer instructions in a programming language is known as Coding.

A computer program is usually written by a computer programmer in a programming language. From the program in its human-readable form of source code, a compiler can derive machine code—a form consisting of instructions that the computer can directly execute.

That line of code is written in the Python programming language. Put simply, a programming (or coding) language is a set of syntax rules that define how code should be written and formatted. Thousands of different programming languages make it possible for us to create computer software, apps and websites.

In programming, code (noun) is a term used for both the statements written in a particular programming language - the source code , and a term for the source code after it has been processed by a compiler and made ready to run in the computer - the object code .

You might be interested in
"Your supervisor has asked you to modify the AMOUNT column in the ORDERS table. He wants the column to be configured to accept a
vesna_86 [32]

Answer:

ALTER TABLE orders

MODIFY (amount DEFAULT 250)

Explanation:

  • ALTER TABLE statement is used to modify "amount" column in the existing "orders" table  
  • MODIFY (amount DEFAULT 250) is used to set the default value 250 of the "amount" column.

Therefore if the supervisor wants the amount column to be configured to accept a default value of 250, then "ALTER TABLE orders MODIFY (amount DEFAULT 250) " statement should be issued.

5 0
3 years ago
Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
EastWind [94]

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.

3 0
2 years ago
Suppose a program takes 1000 machine instructions to run from start to end, and can do that in 10 microseconds when no page faul
Tema [17]

Answer:

(10^6 + 9.9)

Explanation:

Given:

Total number of machine instructions = 1000

Number of page fault in 100 instructions = 1

Number of page faults in 1000 instructions = 10

Time to serve one page fault = 100 milliseconds

Time to serve ten page faults = 100*10 milliseconds = 1000 milliseconds = 10^6 Microseconds

Number of instructions without any page fault = 1000 - 10 = 990

Time required to run 1000 instructions = 10 Microseconds

So, time required to run 990 instructions = (10*(990/1000)) Microseconds = 9.9 Microseconds

So, the total time required to run the program = (10^6 + 9.9) Microseconds

3 0
3 years ago
Which type of chart is most useful when a user is trying to visually represent sets of data as parts of a whole, such as product
nataly862011 [7]

Pie chart, I’m fairly sure the rest aren’t real

5 0
3 years ago
Read 2 more answers
A variable used as a subscript should be initialized to ________.
jeyben [28]
The answer is d. Two
Two variables referring to the same array object
6 0
3 years ago
Other questions:
  • A computer is not connecting to certain network devices properly. the ip address information is as follows: ip address: 192.168.
    6·1 answer
  • Which word most strongly appeals to pathos?
    15·1 answer
  • 11.
    11·1 answer
  • Integration Management, one of the 10 PMBOK Guide Knowledge Areas, represents the processes and activities to identify, define,
    12·1 answer
  • Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hac
    9·1 answer
  • Before the electronic era information was usually directly communicated and not recorded, much of the information you received w
    9·1 answer
  • Help giving points mark BRAINLEST
    5·1 answer
  • I need neveahbowe to see this.
    10·1 answer
  • Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
    7·1 answer
  • How to square a number in java.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!