For what purpose are high-level programming languages used for

1. Give control over the hardware to execute tasks quickly

2. Provide code that controls the computers hardware

3. Translate low-level programming languages into machine code

4. Write programs for general applications

Answers

Answer 1

Answer:

To speed up the compiler during run time

Explanation:


Related Questions

What are three things to consider in programming design?
the problem being addressed, the goals of the project, and the programming language that will be used
the problem being addressed, the goals of the project, and the age of the end users
the age of the end users, the programming language that will be used, and the programming style of the
programmers working on the project
the age of the end users, the goals of the project, and the programming style of the programmers working on the
project

Answers

The issue being solved, the project's objectives, and the users' ages. The project's programmers' programming styles, the programming language they will use, and the age of the intended customers.

What is programming language?

Programming language is defined as a computer language used to converse with computers by programmers (developers). Orthogonality or simplicity, available control structures, data types, and data structures, syntactic design, support for abstraction, expressiveness, type equivalence, strong versus weak type checking, exception handling, and limited aliasing are among the characteristics of a programming language.

Clarity, simplicity, and unity offer a way to express algorithms as well as a framework for thinking about them. Every possible feature combination has value thanks to orthogonality. Surprisingly, it may frequently be reduced to three basic programming constructs known as loops, selects, and sequences.

Thus, the issue being solved, the project's objectives, and the users' ages. The project's programmers' programming styles, the programming language they will use, and the age of the intended customers.

To learn more about programming language, refer to the link below:

https://brainly.com/question/12696037

#SPJ5

why is makyra a loser??​

Answers

Because she doesn’t have any friends :-(

Answer:

She dumbbbbbbbbbbbbbbbbbbbbbb

Explanation: Her mom watched too much spongebob while pregnant

what are the earliest invention in human history​

Answers

Answer: Tools, Boats, Hand made bricks.

Explanation: The tools were the first technological advancement, the boats were the next, them hand made bricks for construction.

1605:newspapers
1608:telescope
1620:Compound microscope
1630:Slide rule
1642:mechanical calculator 1643:barometer
1650:vacuum pump
1656:pendulum clock

Hope this is enough

What problems might you encounter when using the Web for research?
a. Lack of current news
b. Undocumented sources
c. Lack of search tools
d. Time-consuming searches
e. Unreliable conten

Answers

Answer:

b. d. e.

Explanation:

The web is a vast and endless database of information and has become an invaluable resource for research. That being said it can also bring with it many problems, the main one being unreliable content due to undocumented sources, false testimonies, information with no evidence, etc. The amount of false information on the internet can sometimes make it very time consuming since you have to take the extra step of verifying the information you come across. Despite this, the WEB has information on every topic including current news, and with the wide array of search tools available it is very easy to find what you are looking for.

Write code that determines the number of full days represented by the number of hours stored in the variable hours and stores that value in the variable full_days. For example, the number of full days in 50 hours is 2. Ignore any leftover hours that don't contribute to a full day. Assume the value of hours has already been initialized. Solve It!

Answers

Answer:

hours = 50

full_days = int(hours / 24)

print("The number of full days in " + str(hours) + " hours is " + str(full_days))

Explanation:

Initialize the hours

Since there are 24 hours in a full day, divide the hours by 24. Note that you need to typecast it to the int, because the result is a decimal value by default

Print the values as requested

Sorry if this is not related.


What is the best game programming language to learn?

Answers

These are my recommendations but you should just try to find the one that’s right for you ——
Python for beginners.
C++ for game development. (C# for unity game development )
html5 for web development.
Java or JavaScript for software development
I suggest you to try either Visual Studio, Python or Java and JavaScript.
Python and Java are comparingly easy.

What is 10X Profit Sites?

Answers

Answer:

Wow! That's amazing!

Explanation:

edhesive 1.7 code practice question 1
Fix the error so that the code works correctly
input (“Enter a number: “)
print (num * 8)
How do I fix the error?

Answers

Answer:

num = int(input("Enter a number: "))

print(num * 8)

Explanation:

I highlighted the parts that are added

Since you are getting an input from the user, you need to set the result to a variable. In this case, it is num.

Since it is a number, you need to specify the its type. In this case, it may be int.

Also, the quotation marks must be written as seen.

The corrected program which ensures that the program runs correctly is written thus :

num = int(input("Enter a number: ")

#user supplied input should be assigned to the varibale num

print(num * 8)

#multiplies num by 8 and displays the output.

The num variable in the second line isn't attached to any value, therefore, it will throw an error.

The user input value should be attached to the variable, 'num'

The second line of code multiplies num by 8 and displays the product.

Therefore, if the the user input is 3 ; the final result displayed will be : (3 × 8) = 24.

Learn more :https://brainly.com/question/15566254

what is ovoviviparous? ​

Answers

Answer:

o·vo·vi·vip·a·rous

Explanation:

(of an animal) producing young by means of eggs which are hatched within the body of the parent, as in some snakes.

What is the name of a shortcut you can click to access other websites? A. A post B. A key C. HTML D. A link

Answers

Answer:

D. A link

Explanation:

I hope this helps.

Answer:

A LINK

Explanation:

I just did the test

true false) keybord has two shift keys.​

Answers

Answer:

True, looking at 'em right now!

Explanation:

Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a characteristic is necessary for successful completion of the job? Answer by writing a paragraph of two to three sentences.

Answers

Employing someone based on gender is unlawful because, it is the skill which matters to get the required job done and skills are not based on gender. There is no evidence that this particular gender cannot do this job and this particular gender can do. Everyone who posses the required skillsets are eligible to get employed irrespective of gender.

===============================================

I tried my best

A network is:
A. A group of people or things that are individually connected to one another.
B. A number of individuals who share the same values and ideas.
C.a means of mass communication in print and other forms.
D. The main idea or information contained in a media piece.

Answers

Explanation:

The answer to this question is A

Where is the video card located in a computer?

Answers

Video card??????????
pretty sure it’s in the motherboard?

Write a Java program that prompts the user for an int n. You can assume that 1 ≤ n ≤ 9. Your program should use embedded for loops that produce the following output: 1 2 1 3 2 1 4 3 2 1 5 4 3 2 1 . . . n . . . 5 4 3 2 1 Your prompt to the user should be: Please enter a number 1...9 : Please note that your class should be named PatternTwo.

Answers

Answer:

Here is the JAVA program:

import java.util.Scanner;  // to take input from user

public class PatternTwo{   //class name

public static void main(String args[]){  //start of main function

Scanner scan = new Scanner(System.in);   // creates Scanner class object

System.out.print("Please enter a number: ");  //prompts user to enter an int n for the number of rows

int n = scan.nextInt();   //reads and scans the value of n from user

int i, j;   //declares two variables to iterate through i  rows and j columns

for (i=1; i<=n; i++){    //outer loop for rows  

for (j=2*(n-i); j>=1; j--){   //inner loop for space between numbers in pattern  

System.out.print(" ");  }   //displays an empty space in the pattern

for (j = i; j >= 1; j--)  { //inner loop for columns  

System.out.print(j+" "); }   //prints the value of j (prints numbers in reverse)

System.out.println();   }   }   }  //prints a new line after printing each row

Explanation:

The program is explained with an example in the attached document.

Naseer has inserted an image into his document but needs the image to appear on its own line.

Which option should he choose?

•Top and Bottom
•Tight
•Through
•In front of text

Answers

Answer:

Top and Bottom

Explanation:

took the test

Answer: A

Explanation:

The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely

Answers

Answer: Operational Manager

Answer: operational manager

Explanation: APEX

Many of the first photographers were actullay scientists and inventors

Answers

Answer:

True, if its a true or false. Otherwise I am of no help.

Explanation:

Answer:

True

Explanation:

which check the functioning of all the connected hardwares including primary and secondary storage devices​

Answers

Answer: The computer processor

Explanation:

The computer processor is also called the central processing unit and it's function is to analyzes data and also disperses data. It is the computer's brain as it tells the computer the kind of programs to do at a particular time.

The computer processor checks the functioning of all the connected hardwares including primary and secondary storage devices.

Match each task with the features necessary to complete the task

Answers

Is there supposed to be an image?

What is true about connectionless packet switched networks? a. each datagram must contain both source and destination addresses b. without a connection, datagrams may not arrive in sequential order at the destination c. establishment of a connection between communicating points is not required prior to exchanging datagrams, thus reducing overhead communications d. all of the above are true

Answers

Answer:

d. all of the above are true

Explanation:

Connectionless Packet Switching is a term that is used in computer networking operations to describe the breaking of information exchange path into a various packet of small sizes acquired and refined over network switches and routers, which is then transferred from one subsequent node to the other. It is sometimes referred to as Datagram Networks

However, during this operation, Connectionless Packet Switching must satisfy the following amongst others:

1.  each datagram must comprise both source and destination addresses

2.   without a connection, datagrams may not come in sequential order at the destination

3.  establishment of a connection between communicating points is not needed prior to exchanging datagrams, thus reducing overhead communications

Therefore, considering the available options, the correct answer is option D

Explain demand paging with a proper example

Answers

Demand paging :

In computer operating systems, demand paging (as opposed to anticipatory paging) is a method of virtual memory management. In a system that uses demand paging, the operating system copies a disk page into physical memory only if an attempt is made to access it and that page is not already in memory (i.e., if a page fault occurs). It follows that a process begins execution with none of its pages in physical memory, and many page faults will occur until most of a process's working set of pages are located in physical memory. This is an example of a lazy loading technique.

what is the color of red?

Answers

Answer:

red

Explanation:

orange and red

Answer: Red

Explanation: The reason why it's red is because of how we see colors through our eyes.

Which of the following is not true about templates?

It incorporates formatting elements.

They slow down the process of creating presentations.

It incoprorates layout options.

It may include content that can be modified.

Answers

The answer is they slow down the creating of presentations.

Help me for this question

Answers

Answer:

Answer C

Explanation:

You are welcome

briefly explain the usage of the MS PowerPoint

Answers

Answer:

PowerPoint is a computer program that allows you to create and show slides to support a presentation. You can combine text, graphics and multi-media content to create professional presentations.

Answer:

Making your presentation more interesting through the use of multimedia can help to improve the audience's focus. PowerPoint allows you to use images, audio and video to have a greater visual impact. These visual and audio cues may also help a presenter be more improvisational and interactive with the audience.

The binary string 00100100 is a member of which of the following problems? Remember, a "problem" is a language whose strings represent the cases of a problem that have the answer "yes." In this question, you should assume that all languages are sets of binary strings interpreted as base-2 integers. The exception is the problem of finding palindromes, which are strings that are identical when reversed, like 00100100, regardless of their numerical value.

Answers

This question is incomplete, the complete question is;

The binary string 00100100 is a member of which of the following problems? Remember, a "problem" is a language whose strings represent the cases of a problem that have the answer "yes." In this question, you should assume that all languages are sets of binary strings interpreted as base-2 integers. The exception is the problem of finding palindromes, which are strings that are identical when reversed, like 00100100, regardless of their numerical value.

a) Is the given string a palindromes ?

b) Is the given string a perfect cube?

c) Is the given string greater than 50?

d) Is the given string even?

e) is the given string a perfect square?

Answer:

a) the given binary string is a palindromes

b) the given string is NOT a perfect cube

c) the given string is NOT greater than 50?

d) the given string is an even

e) the given string a perfect square

Explanation:

Given that;

binary string : 00100100

a)

Is the given string a palindromes ?

the given binary string = 00100100

now when you reverse the string, its still going to be : 00100100

so the given binary string is a palindromes

b)

Is the given string a perfect cube

the given string : 00100100 = 36

now 2^3 = 8,

3^3 = 27,

4^3 = 64

so 36 is not a perfect cubic

hence the given string is NOT a perfect cube

c)

Is the given string greater than 50?

the given string : 00100100 = 36

and 36 < 50

so the given string is NOT greater than 50?

d)

Is the given string even?

the given string  : 00100100 = 36

and 36 can be divided exactly by 2

so the given string is an even

e)

is the given string a perfect square?

the given string  : 00100100 = 36

now 6^2 = 36  i.e 6 multiply by 6 = 36

therefore the given string a perfect square

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

Answers

Answer:

Vulnerability of.

Explanation:

In this scenario, your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a vulnerability of the network software.

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

When computers are connected and operate through one main computer, it is called a _________ network. centralized client server GUI peer-peer

Answers

Answer:

the answer would be a client server

Explanation:

In a situation wherein computers are connected and operate through one main computer, it is called a client server network. Therefore, the option B holds true.

What is the significance of a client server network?

A client-server network can be referred to or considered as a network wherein all the systems that are collectively a part of the computer network are controlled and handled by a single system. This single system of computers is also known as the main computer.

The main computer has access to all the data, as well as information tracking of the activities performed by the main computer. In order to access anything between the different systems, the members systems need to get authorized access through the main computer.

Therefore, the option B holds true and states regarding the significance of a client server network.

Learn more about a client server network here:

https://brainly.com/question/28099574

#SPJ2

How do you begin typing in a table cell?

A. Click within a cell and begin typing.

B. Highlight the table and begin typing.

C. Click on the Convert to Text button in the Layout ribbon.

D. Right-click and select Text Direction.

Answers

Its Option A - Click Within a Cell and begin typing.
Thank you!

To begin typing in a table cell, click within a cell and begin typing. The correct option is A.

What is a table cell?

A table cell is a subset of a chart table that is used to store information or data. Cells are organized both horizontally and vertically.

Each cell contains information about the combination of row and column headings with which it is collinear.

Text, numbers, and a variety of other elements can be included in table cells. Tables were originally used only to display numbers, but they are now useful for a wide variety of tasks.

To begin typing text into a cell, simply select a cell and start typing. To select text that is already inside a cell, place the insertion point within the cell.

In either mode, you can use the arrow keys to navigate around the table, making it simple to enter text into any cell.

Thus, the correct option is A.

For more details regarding a table cell, visit:

https://brainly.com/question/8059827

#SPJ5

Other Questions
HELP 100 POINTS explain how you would separate the components of a dirty water mixture that consists of: coffee grounds garlic powder vegetable oil sodium chloride (table salt) gravel and sand water. For each step discuss what separation method you are using and why you chose that method Hudson explored all the following except:New York HarborSt. Lawrence RiverHudson BayArctic Ocean A company was able to increase its staff from 127 employees to 204employees. What was the percentage increase in staff? Round youranswer to the nearest tenth. What is the image of the point (-5,4) after a rotation of 270 counterclockwiseabout the origin? the growth and evolution of the world became possible due to factors of colonialism and imperialism? the answer is needed. 9. What part of your arm does the ball bounce off of when bumping the ball? which number can each term of the equation be multiplied by to eliminate the fractions before solving?plzzz help graph the function y= 2.2 - |0.4x + 1|. what are the coordinates, to the nearest tenth, of the maximum of the graph. A. (2.5, 2.2)B. (-2.5, 2.2) C. (0, 3.2)D. (3.2, 0) Witch three values are equivalent to 3/8?62.5%0.3751/46/163.75%50%37.5%3.75 Do two points always, sometimes, or never determine a line? Explain. What would be one advantage of reading this scene as opposed to watching or listening to it? Readers do not have to worry about visualizing the characters appearances. Readers can creatively interpret and visualize stage directions in their minds. Readers do not have to imagine the sounds that accompany characters actions. Readers can focus on the words, rather than the actions, of the characters. What is the slope for y=3x-4? What is the y-intercept for y=3x-4? what are 2 positives of andrew Carnegie and 2 negatives how long is 46.287 minutes which shapes are congruent to shape I in question 1 Is 42k-69k a year a good salary for an electrician What is the "Danger Zone"? 1. 65 to 165 degrees 2. 40 to 140 degrees 3. 25 to 100 degrees 4. all of the above Talia has a square framed moving box with an area of 16 square feet. The cube shaped box has a volume of 66 cubic feet. Will the poster lie flat in the box? A student is trying to find the sum of 5/6 + 3/4 + 1/5 They first tried to use 24 as a common denominator. Why does 24 not work as a common denominator? Read the claim. Breakfast is an important meal. It jump starts the bodys process of using calories to break down food. Appetite can decrease with age, but going too long without eating causes metabolism to slow down. Current research shows that incorporating legumes such as lentils and chickpeas into meals boosts metabolism for twenty-four hours. Who might benefit from this claim? A.people who have a fast metabolismB.stores that sell exercise equipmentC.people who take vitamin supplementsD.grocery stores that sell legumes