_____ provide the standards, syntax, statements, and instructions for writing computer software

Answers

Answer 1
Programming languages provide the standards, syntax, statements, and instructions for writing computer software.
It is a vocabulary and set of grammatical rules. These rules are used for instructing a computer or computing device to perform specific tasks and produce a certain output.

Related Questions

When an attacker decrypts an encoded message using a different key?

Answers

The answer is Key clustering

Ssl (secure sockets layer) operates at which layer of the osi model

Answers

ssl(secure sockets layer) operates at session layer of osi model.

When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. phishing pretexting polymorphing pharming?

Answers

The answer is Phishing

Answer:

The answer is Pharming.

Explanation:

When a hacker steals your confidential and private information by installing a malicious code on your computer which misdirects you to fake and fraudulent websites, this is called pharming. Hacker installs virus on your computer which manipulates the host files on your computer. The hacker uses DNS cache poisoning to attack DNS services on your computer which makes many users to enter fraudulent site, unknowingly, as they type the URL of the real website.These fraudulent website developed by hacker can install virus on your computer and steal confidential information from your computer.

Which computer network component connects two different networks together and allows them to communicate?

Answers

Local area network LAN is the computer component that connects two different networks to allow them have communication.

Answer:

A router.

Explanation:

A router is a device that operates in layer three of level 3. Thus, it allows several networks or computers to connect to each other and, for example, share the same Internet connection.

A router uses a routing protocol, which allows it to communicate with other routers and share information with each other to determine the fastest and most suitable route to send data.

A device that converts analog signals into digital and vice versa for a computer to communicate over phone lines is called a ________?

Answers

Answer:

Modem

Explanation:

The Answer is a Modem

A device that converts analog signals into digital and vice versa for a computer to communicate over phone lines is called a modem.

What is digital information?

Digital information generally consists of data that is created or prepared for electronic systems and devices such as computers, screens, calculators, communication devices. These information are stored by cloud.

The analog signals are discrete in nature and digital signals are continuous waves.

They are converted from digital to analog and vice versa with the help of a device called modem.

Thus, a device that converts analog signals into digital and vice versa for a computer to communicate over phone lines is called a modem.

Learn more about digital information.

https://brainly.com/question/4507942

#SPJ2

What would you enter at the command prompt to find the ip address for the xyzcomp.com domain?

Answers

IP config is a “console application” designed to run from command prompt. This allows the user to get the” IP” address of the machine. This has replaced one another utility called “winipcfg”.

To run this command, goto command line or run prompt and then enter the command “IP config” and then “press enter”, you can alternatively give “IP config localhost” which will give the IP” address of the “current system”.

You can also find “IP address” of other system in the same domain / network by typing “IP config computer_name”"

Which vpn protocol uses ipsec to provide data encryption?

Answers

ESP is a vpn protocol that uses ipsec to provide data encryption.

The VPN protocol that uses IPsec (Internet Protocol Security) to provide data encryption is appropriately called IPsec VPN.

What is IPSsec?

IPsec is a set of protocols that ensure secure communication over the internet by encrypting and authenticating IP packets.

It establishes a secure tunnel between the client and server, protecting the confidentiality and integrity of data transmitted over the VPN connection.

IPsec is widely used for secure remote access and site-to-site VPN connections.

Learn more about vpn protocol  at:

https://brainly.com/question/29571668

#SPJ6

Are the best place to locate current findings on the newest technologies

Answers

Journals are the best place to locate current findings on the newest technologies.  It deals with a particular subject or professional activity, in this case, it deals with the latest findings on the newest technologies.

Dead state is the name of the time delay in a cpu caused by differences between the speed of the cpu and ram.

Answers

The answer is wait state.   Dead state is NOT the name of the time delay in a cpu caused by differences between the speed of the cpu and ram.  Wait state is the name of the time delay in a CPU caused by differences between the speed of the CPU, the system bus, and memory circuits.

Microsoft Word® and Microsoft Publisher applications have similar tabs; however, Microsoft Publisher does not have the _____ tab. Insert Page Design Page Layout Home

Answers

Answer:  Page Layout

Explanation:

- To add a page in publisher, right click on the page and select insert page whereas in Microsoft word, go to the Insert tab and from there select insert page

- To select the page or the certain paragraph that you want to change the layout for. Then click on the page layout tab, and from there you can choose different options (e.g. portrait, landscape) to adjust the orientation for your document

- The home tab, is available in both Microsoft word and publisher

- Page Design is available in both

Answer:

page layout

Explanation:

What protocol is used in conjunction with http to make it secure?

Answers

TLS (Transport Layer Security). HTTP + TLS is called HTTPS.

Which group on the sparkline tools design tab would you choose if you wanted to change the data source of the sparkline? (1 point) type sparkline style show?

Answers

The answer is (B) Sparkline

Sparkline is a feature in MS Excel that enables you to see trends within your data at a glance. Once the procedure is followed to create a Sparkline, you can change the Sparkline’s data source. To do this, you need to select the Sparkline cell and go to the Sparkline tools tab. You can proceed to click on Design - Sparkline - Edit Data - Edit group location and data/ Edit Single Sparkline’s Data option.

Answer:

I believe the type is line but that's all I know sorry :(

To make active directory more manageable, it is divided into the domain partition, configuration partition, and what other partition?

Answers

The answer is schema partition. To make Active Directory more manageable, it is divided into the domain partition, configuration partition, and schema partition partition.  Only one schema partition exists per forest. It is stored on all domain controllers in a forest. 

Final answer:

Active Directory is organized into partitions such as the domain partition, configuration partition, and the schema partition, with the schema containing definitions for all AD objects and attributes.

Explanation:

The Active Directory (AD) in Windows Server environments is divided into several partitions to make it more manageable. These partitions include the domain partition, the configuration partition, and the schema partition. The schema partition is where definitions of all AD objects and their attributes are stored. It is essentially a blueprint for the structure of the Active Directory's directory service. This design helps in separating different types of information for easier management and to allow for replication only where necessary.

Which protocol, as a companion protocol to RTP, provides monitoring and reporting for RTP connections?

Answers

The answer is Real Time Control Protocol (RTCP).   A companion to RTP, the RTCP provides monitoring and reporting for RTP connections.  It resembles the RTP but there are more alternate structures that depend upon the type of the RTCP packet.

What earlier breach of childhood code can you remember?

Answers

Python,
Java Oracle
or C++ I think so.

When the system denies access to someone who is authorized it is called a - false negative?

Answers

the computer declined the process for the password

You relate tables to one another by using _______ fields.

Answers

Answer:

You relate tables to one another by using Matching fields

Explanation:

If there are more than one table in the database, then mostly there would be a relationship existing between the two table.

For Eg. There would be Department table where this table contains details of department number, department name and Name of the primary incharge, etc. There would be a table called “Employee” where it would contain the name of the employee along with his personal information and there would be a column where each employee would be associated with the department and would contain a field called as “department number”.

So here the database contains more than one table and these two are related using department number which is common to both the table.

Which of the following is a domestic business activity?

Answers

What are the options?

A domestic business typically has the advantage of only having to deal with its local currency, customs, culture, regulations and tax system. So i think it would be purchasing a soft drink that was made in your own country because it was purchased in its local currency

What impacts the types of logs and events logged on a server?

Answers

The answer is Roles installed.  This impacts the types of logs and events logged on a server

A new information system is not considered in production until conversion is complete

Answers

This is True

Often, data conversion is necessary for the installation of a new information system. Data conversion involves existing data being loaded into the new system. Depending on the system, it can be done before, during or after the new information system is complete.

Keyboards and printers are two examples of _________ devices.

Answers

input device your welcome

Bittorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.

Answers

Final answer:

BitTorrent functions on a peer-to-peer (P2P) network structure, enabling devices to share files directly without a central server. This decentralized approach is effective for distributing large files, making BitTorrent and related Torrent sites popular for sharing diverse types of data.

Explanation:

BitTorrent utilizes no central server, instead opting to utilize a peer-to-peer (P2P) structure where each device connected to a network has equal access to the shared files. In a P2P network, each participant, or "peer," acts both as a client and a server, sharing portions of the file directly with other peers. This decentralized model can handle large amounts of data efficiently, making it a popular method for distributing files online, including books, music, films, and scientific data sets.

One of the key advantages of the BitTorrent protocol is its ability to distribute large files effectively without the need for a powerful central server. As more users download and share a file, the distribution network becomes faster and more resilient. This efficiency is what has made BitTorrent and associated Torrent sites a preferred choice for sharing large volumes of data across the internet.

A call to a value-returning function with an empty formal parameter list has the form ________ .
a. function name
c. void function name
c. function name(void)
d. functionname()

Answers

The correct answer is D

Final answer:

A call to a value-returning function with an empty formal parameter list has the form functionname(). This signifies no input arguments and is used when a function does not require any arguments to perform its task. D is correct.

Explanation:

A call to a value-returning function with an empty formal parameter list has the form functionname(). This indicates that the function does not take any arguments. When we define a function call, we specify the name of the function followed by an argument list enclosed in parentheses. However, in this case, the parentheses are empty because the function does not require input arguments.

It's important to note that the type of return value a function provides is declared by the keyword before its name. If the keyword is void, it means that the function does not return a value. Functions in programming are designed to perform computations or actions; they may 'take' input arguments and 'return' a result, this result is known as the return value.

Since the web.xml file describes how the web application should be configured when it is deployed on a server, the file is known as the

Answers

The answer is:deployment descriptor (DD)

Several of the eap protocols use ____, which creates a ciphertext from cleartext.

Answers

Several of eap protocols use encryption function, which creates a ciphertext from cleartext.

which of the following is not a renewable resource

oil

solar energy

at least some types of lumber

wind

Answers

Hey there! :) 

A renewable source is a resource that can be used to power up something. It can also be reused - meaning that it can be used over and over again. Renewable sources are also able to be replaced naturally, meaning that once that specific resource runs out, it be be replenished without the creation or usage of a machine or man made resource. 

Oil is NOT considered a renewable resource because it's a fossil fuel.

Solar energy IS a renewable resource because we have an infinite amount of solar power! 

Some types of lumber ARE considered renewable simply because trees can be regrown, thus creating an infinite cycle of tree growth and renewable energy.

Wind IS considered a renewable resource because wind can be generated without the usage of machines, and it's also renewable because of how limitless it is! 

So, our answer is the first answer choice : oil.

~Hope I helped!~

Answer:

oil is not a renewable resource. Please Mark it as brainlist answer.

A low-level language has a low level of ___________ because it includes commands specific to a particular cpu or microprocessor family.​

Answers

Command Specifics to a cpu or a microprocessor it is code 

What type of encryption algorithm uses the same key to encrypt and decrypt data?

Answers

Symmetric encryption.

The type of encryption algorithm that uses the same key to encrypt and decrypt data is:

symmetric encryption

Encryption is the process of protecting ot securing data by the means of a key or other forms of authorization protocol.

A symmetric encryption is one where data is protected using the same key for both locking and unlocking.

Using this kind of encryption, an administrator protects his data using only one key. This method of encryption is usually not secure and can be easily bypassed by a hacker or its data compromised.

Therefore,  the correct answer to the question is symmetric encryption.

Read more here:

https://brainly.com/question/20262508

To display or distribute information from a database, programmers or database administrators create ___ .

Answers

Final answer:

To display or distribute information from a database, programmers or database administrators create reports

Explanation:

Reports are objects within a database management system (DBMS) that present data in a formatted, reader-friendly manner. The information for these reports is sourced from tables or queries within the database, known as the report's record source. Among various objects in a DBMS, such as tables, queries, and user interfaces, forms are also crucial. Forms provide an interactive interface to the data stored in the database, potentially improving data entry efficiency and limiting access to sensitive information.

A database uses a structured collection of data files managed by a DBMS. Essential tasks like the creation, storage, maintenance, and retrieval of data are facilitated by the DBMS, which can be accessed through software packages like Microsoft Access, Oracle, or FileMaker Pro. This streamlines operations for a variety of sectors, including business, government, and personal uses.

Chat messages are most likely to be found where on a computer? firewall nic internet history ram

Answers

The answer is RAM.  Chat messages are most likely to be found in the RAM of the computer.  It is Random Access Memory.  RAM is considered volatile memory, which means that the stored information is lost when there is no more power.
Other Questions
Susan received grades of 78, 93, 82, and 76 on four math exams. What is the lowest score she can receive on her next math exam and have an average of at least 85 on the five exams?A) 96B) 94C) 92D) 90E) 88 What is the area of triangle LMN What was the most effective way the american colonists responded to british taxes, such as the stamp act and townshend acts? write the equation 12=3x + 6 in the form ax + b = c with c=12 what are the values of a & b? The average July rainfall for charleston , south carolina, is 8.35 inches The average October rainfall is 3.87 inches on the average how many more inches of rain fell in july than in october? Marine sponges contain a biological catalyst that blocks a certain step in the separation of chromosomes. which cellular process would be directly affected by this catalyst The university of florida's athletic program became carbon neutral because it _____. the university of florida's athletic program became carbon neutral because it _____. recycled all paper used in its program and at football games eliminated consumption of all plastics throughout its program and athletic events promoted programs that reduced fossil fuel use and sequestered carbon replaced all vehicles with electric cars What is the equation for the sum of three consecutive even numbers totaling 198.Question 4 options:n+n+1+n+2=198n+n+2+n+4=1983n=198n+3=198 Jason brought $39.50 to the state fair. he bought a burger, a souvenir, and a pass. the burger was 1 3 as much as the souvenir, and the souvenir cost 1 2 the cost of the pass. jason had $4.50 left over after buying these items. what was the cost of each item?jason brought $39.50 to the state fair. he bought a burger, a souvenir, and a pass. the burger was 1 3 as much as the souvenir, and the souvenir cost 1 2 the cost of the pass. jason had $4.50 left over after buying these items. what was the cost of each item? The money multiplier: question 20 options:a.is equal to the reserve requirement.b.demonstrates that small changes in reserves have a negligible impact on the total money supply.c.measures the maximum amount the money supply can increase when new deposits enter the banking system.d.works only for increases in the money supply and never for decreases. What is the power of a machine that pushes with a force of 3 n for a distance of 9 m in 8 s? Neonatal jaundice results when a newborn baby's liver is not working fully to remove a particular waste product. treatment involves placing the infant under a blue light, which reacts with the waste product and converts it to a form that the kidney can excrete. what is this waste product called? Read the excerpt and answer the question. The good Missionary disgusted with this idle Tale, said, What I delivered to you were sacred Truths, but what you tell me is mere Fable, Fiction and Falsehood. The Indian offended, reply'd, My Brother, it seems your Friends have not done you Justice in your Education, they have not well instructed you in the Rules of common Civility. You saw that we who understand and practise those Rules, believ'd all your Stories: Why do you refuse to believe ours? How does Franklin use irony in this excerpt from Remarks Concerning the Savages of North America? : hydrochloric acid reacts with the mineral calcite to produce carbon dioxide gas, water, and calcium chloride. based on what you have learned in activity a and activity b, what are three things you could do to make the reaction occur more quickly? Which created a challenge to Soviet control over Poland in 1980?SolidarityHelsinki groupsNATOThe mujahideen In order for cells to function properly, the enzymes that they contain must also function properly. What can be inferred using the above information? What term refers to an enzyme that stopped working? Read the poem. excerpt from I Explain a Few Things by Pablo Neruda And one morning all was aflame and one morning the fires came out of the earth devouring people, and from then on fire, gunpowder from then on, and from then on blood. Bandits with airplanes and with Moors, bandits with rings and duchesses, bandits with black-robed friars blessing came through the air to kill children, and through the streets the blood of children ran simply, like childrens blood. Jackals that the jackal would spurn, stones that the dry thistle would bite spitting, vipers that vipers would abhor! Facing you I have seen the blood of Spain rise up to drown you in a single wave of pride and knives! Refer to Explorations in Literature for a complete version of this poem. Which explanation about I Explain a Few Things best develops the speakers viewpoint that adversity only makes his compatriots stronger? The image of friars blessing the bombs that kill the children provides an example of why those under attack are anxious to fight back. By portraying the fires, gunpowder, and blood, the speaker shows that the horror of this war will only end when their opponents give up. The image of fellow citizens rising up and drowning the enemy in a wave of pride and knives demonstrates that they will remain defiant. By describing their opponents as Jackals that the jackal would spurn, the speaker stresses that an enemy this brutal is difficult to stand against. A surveying instrument aimed at a location can shoot the distance to the location, giving the surveyor a measurement. A surveyor used such an instrument to record the distance to a point on a tree 60 m from his position. After rotating his surveying instrument 57 to the left, he measured the distance from his same position to a fence post 35 m away. a.) Draw the diagram and label the tree as point T, the surveyor as point S, and the fence post as point F.b.) Determine the distance between the point on the tree and the fence post. (Show the appropriate formula, substitutions, and work. Give the distance to the nearest tenth of a meter.)c.) Use the Law of Sines to find the measure of T. (Show the appropriate formula, substitutions, and work. Give the measure of T to the nearest degree.)d.) Find mFPlease Help Me :( Why was satire popular among 18th-century English writers? A.Writers wanted to create a new form of writing not previously known to England. B.Writers wanted to memorialize the revered kings and queens of Great Britain. C.Writers wanted to share personal stories with their readers. D.Writers wanted to promote reason and rationality over tradition and religion.