1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sindrei [870]
2 years ago
7

What is the difference between compliled and intebrated language?

Computers and Technology
2 answers:
STatiana [176]2 years ago
8 0

Answer:

1.

Compiled Language:

A compiled language is a programming language whose implementations are typically compilers and not interpreters.

Interpreted Language:

An interpreted language is a programming language whose implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions.

2.

Compiled Language:

In this language, once the program is compiled it is expressed in the instructions of the target machine.

Interpreted Language:

While in this language, the instructions are not directly executed by the target machine.

3.

Compiled Language:

There are at least two steps to get from source code to execution.

Interpreted Language:

There is only one step to get from source code to execution.

4.

Compiler Language:

In this language, compiled programs run faster than interpreted programs.

Interpreted Language:

While in this language, interpreted programs can be modified while the program is running.

Nady [450]2 years ago
3 0

Answer:  

A compiled language is a programming language whose implementations are typically compilers and not interpreters. In this language, once the program is compiled it is expressed in the instructions of the target machine. There are at least two steps to get from source code to execution. While, an interpreted language is a programming language whose implementations execute instructions directly and freely, without previously compiling a program into machine-language instructions. While in this language, the instructions are not directly executed by the target machine. There is only one step to get from source code to execution.

I hope this helps.

You might be interested in
Ruth designs games for mobile operating systems such as iOS and Windows. The demand for games on mobile devices is high. Ruth’s
VMariaS [17]

Answer:

Viper Slash can be classified as a Question mark product

Explanation:

BCG matrix is a method developed by the Boston Consulting Group to analyze the strategic position and potential of businesses or products.

Business portfolios are evaluated using

  1. Relative market share
  2. Market growth rate

The result of the analysis is divided into four quadrants

  1. Dogs
  2. Cash cows
  3. stars and
  4. question marks

  1. Dogs: This comprises of business portfolios that operate in a slow-growing market. Investing in businesses in this quadrant is not advised due to their poor cash returns.
  2. Cash cows: These include business portfolios that provide high cash returns and should be milked.
  3. Stars: These are business portfolios that are operating in a fast-growing market and possess very high prospects of becoming cash cows.
  4. Question marks: are business portfolios that are underdogs in fast growing markets, they consume much cash but still, incurred losses. They don't gain many market shares despite high investments and have great tendencies to become dogs.

Ruth's Viper Slash falls into the Question marks category as the games section is a fast-growing market and struggle to gain market shares.

6 0
3 years ago
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofin
Ipatiy [6.2K]

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

4 0
3 years ago
______ are small text files that websites place on your computer to record your online activities
goblinko [34]
The correct answer is “C. Cookies”
8 0
2 years ago
You need to fax a portion of a map from a large hard-cover atlas to a client from an internal fax-modem. To fax the map, the bes
Flura [38]
The fax modem is used to send and receive fax messages by only having phone line (fax machine is not required). The scanned documents should be saved as digital file (image or PDF format) in order to be sent. So, in order to send a portion of a map you should first convert the map into digital file and than simply send it through the fax modem. The best way to convert it to a digital file is to use an optical character recognition (OCR). 
4 0
3 years ago
numA = 2 numB = 3 if numA == 2 or numB == 2: print("yes") elif numA == 2 and numB == 3: print("no") Output:
vagabundo [1.1K]

Because of the or keyword in the if statement, only one of the conditions has to be true.

The if statement is true if numA equals 2 or numB equals 2, and numA does equal 2, therefore, the output is yes.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Caroline has been asked to find a standard to guide her company’s choices in implementing information security management system
    13·1 answer
  • Is the IOT governable by frameworks? Explain your rationale.
    13·1 answer
  • If an M:N relationship is mandatory on both sides, and if both relations resulting from the entities involved in the relationshi
    12·1 answer
  • A computer can function in the absence of software true or false​
    15·2 answers
  • Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
    12·1 answer
  • The 60-watt light bulb has a 400 hour life expectency how much will it cost to operate during its time
    14·1 answer
  • What is a key function of a scrum master plato answer plz
    13·1 answer
  • 1. What is material science?
    14·2 answers
  • Cyber security class i need help​
    11·1 answer
  • Carl wants to add two new characters to the extraterrestrial battleship game he's
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!