1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
3 years ago
15

What is the most common knowledge computer programmers need in order

Computers and Technology
2 answers:
amm18123 years ago
6 0

Answer:

A

Explanation:

you need full history of the computer and it's development

lesya692 [45]3 years ago
6 0

Answer:

C

Explanation:

You might be interested in
What is used for risk response control?
miskamm [114]

Answer:

Risk response control uses methods such as mitigate, avoidance, shift, actively accept, and passively accept.

Explanation:

Risk Response Control refers to the procedure of evaluating residual risks, detecting new risks, guaranteeing the execution of risk plans, and assessing the success of the plans in decreasing risk is known as risk response control. Whereby the risk response control techniques include acceptance, avoidance, transfer, and mitigation

6 0
1 year ago
What is the most commen code used in games?
melamori03 [73]
Uw12e72jeu3j3gd72hd21heys1738he73ue73jdba
3 0
3 years ago
Which of the following is true about REST?
goblinko [34]

Answer:

D

Explanation:

7 0
3 years ago
The process of bringing data or a file from one program to another is called
Digiron [165]
The answer is importing
8 0
2 years ago
Read 2 more answers
What enables image processing, speech recognition, and complex game play in Artificial Intelligence (AI)?
zysi [14]

Explanation:

Deep Learning enables image processing, speech recognition, and complex game play in Artificial Intelligence

3 0
2 years ago
Other questions:
  • Utilities software and word processing software are both eamples of
    10·1 answer
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • Why is it more secure to require a user to press ctrl+alt+delete to log on rather than displaying the windows welcome screen?
    15·1 answer
  • In a game, your character cleverly places an electronic bug on an unsuspecting felon's jacket to track his movements. The bug tr
    10·2 answers
  • Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?
    7·1 answer
  • Siva added a "Contact Form" to her website.
    10·1 answer
  • Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
    8·1 answer
  • Code written by computer programmers is translated to binary code, so computers can understand the instructions. True or False
    7·1 answer
  • Which one do we use to send signals as IR light waves?
    11·1 answer
  • Arrange these steps of creating a presentation in the correct order. (notice that the given order is incorrect other than the ba
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!