1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
5

What is the basic process of programming?

Computers and Technology
1 answer:
NikAS [45]3 years ago
8 0

Answer:

There are usually three stages to writing a program: Coding. Compiling. Debugging.

You might be interested in
List 4 (four) applications you have used that most likely employed a database system to store persistenet data
ANEK [815]

Four applications that most likely employed a database system to store persistent data are:

  1. Banking
  2. Airlines
  3. Universities
  4. Online news sites

<h3>What is a persistent data?</h3>

A persistent data can be defined as any type of data that comprises an information that is durable, rarely accessed and isn't likely to be modified, even when the parent application is accessed and altered.

In Computer technology, four (4) real-life applications that most likely employed a database system for the storage of persistent data include the following:

  1. Banking
  2. Airlines
  3. Universities
  4. Online news sites

Read more on data here: brainly.com/question/14788007

#SPJ1

6 0
2 years ago
4. are the outputs of a process, team or organization in the form of documents that enable effective actions. *
aleksandr82 [10.1K]

Answer:

The answer is "Knowledge Presentation ".

Explanation:

There are several descriptions of an idea of knowledge or learning. It may have a lecture segment about teaching or focusing on new team members.  

  • One of your points is education. Education, the entire e-learning is all about knowledge transfer.  
  • you could be a trainer or a teacher, once you're talking about knowledge every moment you present this.  
  • Adding the visual symbol with wisdom, which represents an idea of wisdom, allows the slides more attractive and more memorialized.
6 0
3 years ago
Which of the following lists the stages of the four-stroke engine cycle in the correct order of operation?
kvasek [131]
The answer is (a) Intake, Compression, Power, Exhaust.
The fourth-stroke engine cycle or the commonly known as the four cycle is a type of engine that completes four separate strokes while turning a crankshaft. First is the Intake where the piston begins at TDC. Second is the compression where it begins at BDC and the piston compresses the air-fuel mixture for ignition. Third is combustion where the second revolution of the cycle starts. Last is the exhaust where the piston once again returns to TDC from BDC.
6 0
3 years ago
How do you create a algorithm?
aksik [14]
Make sure that each box has an arrow going to it or leading from it, if it needs one. Select “Insert,” then “Shapes,” and choose the Text Box option: Page 2 [Algorithm how-to procedure] 2 Drag the cursor across the document to customize the size of the text box. Click inside the box to begin typing.
brainliest pls
6 0
3 years ago
Read 2 more answers
An administrator uses the ctrl-shift-6 key combination on a switch after issuing the ping command. What is the purpose of using
REY [17]

The purpose of the administrator using the keystrokes is to;

Interrupt the Ping Process.

<h3>Keyboard Commands</h3>

To interrupt an IOS process such as ping or traceroute, it is very important for the user to enter a combination of the Ctrl-Shift-6 key.

Now, Tab will complete the remaining parameters or even arguments within a command.

Finally, to exit from configuration mode to privileged mode, enter the Ctrl-Z keystroke. Thereafter, CTRL-R will redisplay the line you just typed, which makes it simpler for the user to press Enter key and reissue the ping command.

Read more about computer keyboard commands at; brainly.com/question/14447287

7 0
3 years ago
Other questions:
  • A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be tran
    6·1 answer
  • Why do generated backup scripts usually include backticks around names such as database names and column names?
    5·1 answer
  • When parallel sections of oxygen and fuel gas hoses are taped together, only _____ inches out of 12 inches should be covered by
    8·2 answers
  • Cloud kicks recently completed the implementation of sales cloud. Cloud kicks has trained the users to use the mobile app to acc
    12·1 answer
  • ......... defines the path of the movement for an object.
    12·1 answer
  • Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swing
    13·1 answer
  • Modify a list Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: '
    9·1 answer
  • How do you reflect yourself in the topic (filters)​
    14·1 answer
  • HELP!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    8·1 answer
  • How to give answer like this?????
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!