1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Irina-Kira [14]
2 years ago
13

What is high level language​

Computers and Technology
2 answers:
Alika [10]2 years ago
8 0

<em>your </em><em> </em><em>answer </em>A high level language is a computer programming language that resembles natural language or mathematical notation.

masya89 [10]2 years ago
4 0

Answer:

High-level languages allow programmers to write instructions in a language that is easier to understand than low-level languages. Translators are needed to translate programs written in high-level languages into the machine code that a computer understands. Explanation:

You might be interested in
Add the following methods to the ArrayCollection class, and create a test driver for each to show that they work correctly. In o
maks197457 [2]

Answer:

Attached are screenshots of the working code - baring in mind this only works on mutable Collection types. (ones that can be changed) if you use Collections that don't support this you may experience an Unsupported Operation Exception - but this is expected.

Explanation:

Using Java streams as an alternative for some answers.

3 0
4 years ago
Where can you apply the hand wire splicing technique
Ber [7]

Answer:

When you want to extend an electrical wire for an apparatus, e.g., a lamp or a speaker.

3 0
3 years ago
Which is the last line of defense in a physical security sense?
Deffense [45]

Answer: (A) People

Explanation:

 The physical security system is the basically used in the information system. It is used in the technical and the administrator element in the security system. This is the technology oriented system that is basically used to prevent from the hacking attacks in the system.

So, the people is the last statement of the defense in the physical security as the various security system is basically used by various people.

4 0
3 years ago
When researching Information about technology for use in a project, it is NOT important to consider the date that the informatio
REY [17]

Answer:

B. False

Explanation:

Hope this helps!

4 0
2 years ago
Q#1.What general categories of functions are specified by computer instruction?
natali 33 [55]
Is this for a test, because someone else asked that like 5 seconds ago.

4 0
4 years ago
Other questions:
  • In order to protect your computer from the newest virus, which of the following should you do after you've installed a virscan s
    9·1 answer
  • Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a
    14·1 answer
  • What is the advantage of using CSS?
    5·2 answers
  • Sayeed needs to ensure that his manager is up to date on his progress and wants to send a Status Report for a particular task. I
    11·2 answers
  • Describe a new career in computer science that may be created in the future. Include supporting evidence in your response that s
    13·1 answer
  • A program uses two classes: dog and poodle. which class is the base class and which is the derived class?
    7·2 answers
  • You have heard that it is possible to improve your computer's performance by storing all related files for a particular program
    9·1 answer
  • What is the importance of charts and graphics in providing<br> information?
    15·1 answer
  • What are non-examples of wage and salary?
    7·1 answer
  • Why do digital media professionals create portfolios of their work?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!