The instructions tha tell the computer how to carry out the processing tasks are refered to as........

Answers

Answer 1

Answer:

Code

Explanation:

Code are basically instructions in the computers language to tell the computer “what to do.” If you want to, say, open and edit a file, you’d tell the computer to do that by:

Opening the file

Finding where to edit

Adding the line of your choice

Hope this helped!


Related Questions

Which system changeover method would you recommend for an air traffic control system upgrade? Explain your answer.

Answers

Answer:

The definition regarding the given concern is outlined in the following part on the clarification.

Explanation:

As a consequence of technological change, organizations continue to update their software management systems. In implementing a traffic support system update, many methods of changeover growing are considered. The Pilot Changeover procedure is ideally among the different procedures of exchange. The process includes testing the device across a minimal scale at an approved site until the commitment to start it in their organization becomes undertaken.After satisfactory testing, the immediate changeover method becomes required to start the device. This approach is also advantageous as it helps the organization to operate the current model parallel towards the previous one although at much significantly cheaper cost than the simultaneous switching system, rendering it more cost-effective. This happens although the device becomes less expensive, this is fewer expensive because around a similar moment it would not encourage the commercial procedures to generate any disruption.

How should you handle cyberbullies?

Answers

Answer:

insult those son of a bishes backk

i would ✨punch them ✨

Discuss a particular type of Malware and how has it been used in "todays news" and the respective impact on cyber security. Add to your discussion ways the Malware could have been detected and potentially avoided.

Answers

Answer:

Trojan Malware

Explanation:

Trojan horse malware is considered to be one of the most famous computer malware or virus right now. This type of malware is used to fool or trick a user into downloading some malicious software or any file. These attacks are then done by the cyber criminal who can access your system for can get your private credentials.

They send an fake email or a link and by clicking on this fake link, the cyber criminal get access to our computer from where he can access our confidential credentials.

Such a type of cyber attack can be controlled if the employees of the organisation are been educated regularly about the potential threats of these type of malware. Care should be taken not to download file from any un-trusted websites or emails.

In which of the following careers must one learn and use programming languages?

Answers

Answer: any job that has programming in it

if someone has become very attached to their device and feels anxious if they cannot connect to the internet what are they experiencing

Answers

Answer:

anxiety or depression

Explanation:

Because if you like an device if you get get it you get sad and sad and sadder

What is the key function provided by a network

Answers

Answer:

A  key Network Function (NF) of SBA is the Network Repository Function (NRF), which provides NF service registration and discovery, enabling NFs to identify appropriate services in one another.

hope this helps

Explanation:

If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can't steal user's information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.

Answers

Answer:

cookies are stored on client side.

A hacker would need access to your computer, either by physically reading the cookie data or by means of cross-site scripting.

Other than that, cookies should not contain passwords or credit card numbers, just things like preferences or session identifiers.

In no less than two paragraphs, explain the risks and compliance requirements of moving data and services into the cloud.

Answers

Answer:

Compliance requirements of moving data and services into the cloud:

In other to use cloud services, one has to comply or follow the rules of the service providers, the country of the location where these services are provided. All these are necessary for the safety of the data stored in the cloud.

Some countries, regions, often set up rules guarding usage and storing data in the cloud. So it is very important to be aware of this. For instance, some countries enforce data localization laws which make data of its citizen stored in the servers of the country. Here, the country has full protection over the data hosted.

There are also data sovereignty laws that give the country hosting the data a sort of authority to exercise in accordance with the law binding cloud data hosting in their region. This gives the country easy access to information in case of any legal means.

So, when choosing a cloud application, it’s important for an organization to select an application that will aid in cloud compliance and improve your security posture, not create more risk.

It is very important to first know which law is applicable to the country one is residing so as to comply with cloud usage to avoid fines and legal cases.

Risks of moving data and services into the cloud

It is good before using cloud services to know who could possibly have access to the data, if it is safe, how long could data be stored.

If there are unauthorized use of cloud services, the organization providing the service might not be aware of the safety of the hosted data which eventually decreases an organization's visibility and control of its network and data.

Data stored in the cloud could become incomplete, stolen, lost.

The client might not be able to control who else has access to the stored data.

Moving data and services into the cloud could become unattractive again as organizations could lose clients and revenue if clients' trust no longer exists.

Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. Use overloaded methods to implement seat allocation: When a user specifies a seat (row, column), make sure it is available. When a user specifies a price, find any seat with that price. Write appropriate responses to the user if the seat is already taken, if their seat is available, or the seat number of the assigned seat if they just specified a price, etc.
A theater seating chart is implemented as a two-dimensional array of ticket prices, like this:_______.
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 10 10 10 10 10 10 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
10 10 20 20 20 20 20 20 10 10
20 20 30 30 40 40 30 30 20 20
20 30 30 40 50 50 40 30 30 20
30 40 50 50 50 50 50 50 40 30

Answers

Answer:

Answer is given in the attached document.

Explanation:

Explanation is given in the attached document.

Answer:

i do not know

Explanation:

Why is the unallocated space of a Windows system so important to a forensic investigator?

Answers

Answer:

Unallocated space can potentially contain all of these types of files and evidence, either completely or partially as fragments, which can remain untouched for long periods of time, even years after the deletion or activity. This data and evidence cannot be viewed by an ordinary computer user, but can be recovered and examined with specialized forensic software and the expertise of a forensic investigator .

Hope this helps :))

What is the value of the variable index after the Python code below is executed? word = 'bAnana' index = word.find('a')

Answers

Answer:

index = 3

Explanation:

the find() function finds the first instance of a letter or word.

'b' = 0

'A' = 1

'n' = 2

'a' = 3

'n' = 4

'a' = 5

the first instance of 'a' in  "bAnana" is found at index location 3 computer scientist start counting from zero.

The index value of "a" in python code is "3".

Program Explanation:

In the given code, a variable "word" is declared that initializes with a string value that is "bAnana".In the next line, an "index" variable is defined that uses a "word" variable with the find method that prints the index value of "a".Using the print method, that prints the "index" value.

Program:

word = 'bAnana' #defining a variable word that initializes with string value

index = word.find('a')#defining a variable index that calls the find method to print index value of a

print(index)#print index value

Output:

Please find the attached file.

Reason for the output:

Since the array of indexing starts with 0 so, the index value of "a" is "3".  

Learn more:

brainly.com/question/13437928

Other Questions
A delivery truck company just bought a new delivery truck and they need to know the maximum volume it can carry. In the front of the truck, there is an extra ledge that sticks out over the driver's cab for extra storage space. What is the maximum amount of cargo that can fit into the new truck? An American student in new York City practices her Italian student in venice this is an example of the movement of ideas or products? Match each ecosystem with its location. (5 points)Column A1.Alpine:Alpine2.Tundra:Tundra3.Grassland:Grassland4.Deciduous forest:Deciduous forest5.Desert:DesertColumn Ba.Eastern United Statesb.Alaska and Northern Canadac.Central United Statesd.High mountain rangese.Southwestern United States 6x+2=-8+3x+25 whats the answer to x? A person who recited and performed poems but did not write them was called: Rewrite this number in appropriate scientific notation of 4,770,000 Which expression is equivalent to -2 1/4 divided by -2/3 Completa la oracin con la opcin correcta.La conquista de Corts en el actual territorio mexicanoA.no tiene ningn afecto en el desarrollo del imperio EspaolB.sirve para explicar la llegada de los ingleses a NorteamricaC.es esencial para conservar los idiomas de los tanos, mayas y aztecasD.es el primer paso importante en la conquista del resto de Amrica Pls answer this is due by tomorrow so I need help ASAP how to solve 101000/100 Please explain step by step Rachael bought a snorkel and ear plugs for shallow diving. The snorkel cost \$27.69 , and the ear plugs cost \$2.19 . The sales tax of both items was Rachael paid with 2 twenty-dollar bills. How much change did she receive? Two mule deer lock antlers as they demonstrate strength and worthiness to a female mule deer. The winner of this battle will mate with the female. Is it mutualism, parasitism, commensalism, predation or competition qu tan importantes son las emociones en la experiencia de bienestar? Timeliness is an important goal of any access control monitoring system.A. TrueB. False The combined (verbal + quantitative reasoning) score on the GRE (Graduate Record Exam) is normally distributed with mean 1049 and standard deviation 189. Suppose n = 16 randomly selected students take the GRE on the same day. a. What is the probability that one randomly selected student scores above 1100 on the GRE? b. Describe the sampling distribution of the sample mean for the 16 students (description should include mean, standard deviation and shape). c. What is the probability that a random sample of 16 students has a mean GRE score that is less than 1100? d. What is the probability that a random sample of 16 students has a mean score that is more than 1100? e. If the sample size in (d) above was increased to 64, what affect would it have on the probability (more, less, the same, can't tell) and why? On occasional Thursdays after school, you head over to your friend Kellys house to hang out, watch movies, and talk about your weekend plans. Kelly tells you that shes been talking online with a stranger she met in a chat room who says he would like to meet her at the mall the following afternoon. What would you do? Can somebody help me write a journal for English. Where is Fujio when he finds the grasshopper?O He is at a distance from the other children.He is climbing the embankment.He is sitting next to the narrator.He and Kiyoko are standing together. If using the 3rd edition of the textbook, please contact your teacher to bypass this assignment. (2nd edition: Research and record a unique example of ten of the selected tropes and schemes from your reading in the text The Language of Composition on pp. 78-79.) 0.4 is one tenth of what number