Application programs can help users write their own programs in a form the computer can understand using a programming language such as visual basic, cobol, c++, java, or ____.

Answers

Answer 1
another well know example could be python
Answer 2

Application programs can help users write their own programs in a form the computer can understand using a programming language such as visual basic, COBOL, c++, java, or Python.

What is a Programming Language?

A programming language is a set of instructions for dealing with and controlling a computer. These technologies are used to generate websites, applications, operating systems, spacecraft control, and data analysis. Because computers cannot understand English, application programs are required. Programming languages let developers transform their orders into something that the computer can comprehend and execute.

As per the question,

Application programs can assist users in writing their own programs in a programming language that the computer performs, such as visual basic, COBOL, c++, java, or Python.

Thus, the required fill-in-the-blank would be Python in the given sentence.

To learn more about the Python Program click here:

brainly.com/question/15061326

#SPJ5


Related Questions

Which version of windows server 2008 must computer be running to create a failover cluster?

Answers

windows 7 had this problem

Inkjet printers and laser printers are examples of ________ printers.

Answers

inkjet printers and laser printers are examples of NON-IMPACT printers.

"the most common way to access the internet is through ________."

Answers

The most common was is your phone

You are boating on a lake. the weather turns bad. what should all passengers do first?

Answers

Answer:

Wear your life jackets

Explanation:

If you foresee bad weather, the best thing to do is to slow the boat down. Close all doors and windows. Stow all unnecessary equipment.

However, once inside the bad weather. The best thing to do is to wear your life jacket and make sure it is equipped properly. For any reason, you may fall overboard, the life jacket will help you stay afloat. Life jackets typically come equipped with lights and whistles. This would be vital for you to find fellow passengers. And vice versa, of course.

While boating on a lake and the weather suddenly turns bad, quickly advice all passengers to put on their life-jacket.

What is a life-jacket?

A life-jacket is a type of life saving jacket just as the name implies. It is used to suspend the individual that is wearing it on the surface of deep waters.

While traveling by a boat or carrying out a leisurely activity using a boat the following precautions needs to be taken:

Always put on the life-jacket while boating.

Always check the life-jackets to ensure its in good condition before boating

Always check for updates concerning the weather forecast to avoid boating in bad weather.

Therefore, while boating on a lake and the weather suddenly turns bad, quickly advise all passengers to put on their life-jacket.

Learn more about life-jackets here:

https://brainly.com/question/13447405

You can select a noncontiguous range of cells by pressing and holding the ________ key when using it in combination with other navigation keys and/or the mouse

Answers

Hey there!

I believe your answer will be the "Shift" key. You can hold down Shift and select a cell from your current cell position to select everything between the original position and the cell you clicked on without having to drag your mouse across the cells. If you were to hold down the Ctrl or Command key, you would only have your original selection and your new selection highlighted. 

Your answer will be Shift. 

Hope this helped you out! :-)

Which type of fiber connector locks onto the jack when twisted locking connector straight connection straight tip subminiature type a?

Answers

The ST or a straight tip fiber optic connector

Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmitting classified information up to top secret.

Answers

Sarah learns she may only utilize SecNet 54 and SecNet 11 for transmitting classified information up to top secret.

SecNet 11 Plus is a family of encrypted 802.11b wi-fi networking products. The Army has also approved SecNet 11 as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.

Give one advantage and two disadvantages of using a wireless network

Answers

an advantage would be that you wouldn't  have to try to get cables from everywhere but the disadvantages are that you would loose internet while walking and you would have unstable internet. I'm sorry if I'm wrong

If your BAL is .10 you can expect a _______ drop in complex performance compared to the sober level

Answers

36% is the answer to your question.

What is the name of the interface that uses graphics as compared to a command-driven interface?

Answers

Answer = GUI (Graphical User Interface)

In which osi model layer does tcp operate?

Answers

In which OSI  model layer does TCP operate?
The TCP/IP stack has only 4 layers vs 7 of the OSI model.
1 Link & Physical
2 Internetworking
3 Transport 
4 Application 
TCP/UDP operates on the Internetworking layer
IP/ICPMand IGMP work on the Transport layer

What kind of device is a cpu input or output?

Answers

Correct answer: Neither

The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program. This program will take inputs from an input device, process the input in some way and output the results to an output device. It is neither an input nor an output device, but it is usually connected to both kinds of devices.

Output devices like your monitor, speaker, and printer does not process anything fo it to be categorized as a processing device like your CPU and so as input devices like your mouse, microphone, and keyboard.

The technology (software) that automatically downloads website information to your computer is called ________.'

Answers

a malicious program that repeatedly copies itself into a computer's memory .... the authoring language used to create documents on the World Wide Web. ... an interconnected system of internet computers(called servers) that support specially ..... software that automatically downloads information to personal computers.

In order to use the commit command in oracle, you need to clear the check mark from the ____ check box.​

Answers

In order to use the commit command in oracle, you need to clear the check mark from the autocommit check box. The commit command is the transactional command used to save changes invoked by a transaction to the database and autocommit is the default transaction mode in Oracle and commits each action query as soon as the user executes the query.​

Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Answers

its know as a virus (a program created to spread and maliciously harm computers)

When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usually the asterisk character (*)?

Answers

This is a false statement, if that's the question.

Little circles located in front of various website screen options, which can be selected with the mouse, are called ________.

Answers

Little circles located in front of various website screen options, which can be selected with the mouse, are called radio buttons. The radio buttons are graphical elements which enable the user to choose one option from several given. It  is characterized as a circle and is used when the website visitor should choose one option.

A user reports that his macine will no longer boot properly. after asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware has infected the system

Answers

A malware is a software the capable to damage or disable computer programs. The user must reimage the machine or reprogram the system. It can be also boot from Windows installation and use the recovery environment to run a startup repair.

To access an array element, use the array name and the element's ______.

Answers

index. E.g. if the array x is { 5,6,7,8 } the second element would be x[1] containing 6. Index is zero-based.


ASAP

WHEN YOU WANT TO PASS A LARGE TRUCK IN THE CENTER OF THREE LANES, IT'S BEST TO PASS:

A. Quickly on the left and move ahead of it
B. Very slowly on the left and move ahead of it
C. Very quickly on the right and move ahead of it

Answers

I would recommend A. Quickly on the left and move ahead of it because you should always pass on the left and seeing as it is a large truck, you would want to get ahead of it ASAP.

A. Quickly on the left and move ahead of it

What is a large truck called?

In North America, the combination vehicles made up of a powered semi-tractor and one or more semitrailers are known as "semis", "semitrailers", "tractor-trailers", "big rigs", "semi-trucks", "eighteen-wheelers" or "semi-tractor-trailers".

What is a truck called?

Image result for A LARGE TRUCK

truck, also called lorry, any motor vehicle designed to carry freight or goods or to perform special services such as fire fighting. The truck was derived from horse-driven wagon technology, and some of the pioneer manufacturers came from the wagon business

To learn more about LARGE TRUCK, refer

https://brainly.com/question/1992861

#SPJ2

When you view the file list on the
c.drive, you will see the ____ folder?

Answers

When you view the file list on the
c.drive, you will see the users folder?

What to do when the tool bar for paint tool sai dissapears?

Answers

Click windows on the top of the SAI screen. Click the checks until you find what you're looking for.

For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can accomplish this task?

Answers

The administrator of the network can access the admin settings on the network's primary DNS servers. From there, there are hundreds of various settings and changes to make. There is one, however, that is able to disable pings. This will prevent computers from responding to ping requests. This can help to ensure internal security and reduce internal network traffic.

Final answer:

To prevent local computers from pinging each other, a network administrator can adjust the firewall settings to block ICMP Echo Requests, either on individual computers or network devices.

Explanation:

To prevent local computers from pinging each other on a network, a network administrator can configure the firewall settings on each computer. By setting up inbound and outbound rules, they can block Internet Control Message Protocol (ICMP) requests, which are used by the ping command. Specifically, the administrator would need to block ICMP Echo Requests to stop computers from responding to pings. Depending on the network's complexity, this can be done either individually on each computer, through a group policy in a Windows domain environment, or on a central network device like a router or firewall that governs the local network traffic. By implementing these firewall settings, local computers will not be able to ping each other, thus enhancing security on the network.

Which actions can be performed on tables in Word? Check all that apply.

adding rows
adding columns
deleting rows
deleting columns
changing column width
aligning tables
converting tables to text
converting tables to graphs

Answers

✓ adding rows
✓ adding columns
✓ deleting rows
✓ deleting columns
✓ changing column width
✓ aligning tables
✓ converting tables to text
✓ converting tables to graphs

Believe it or not, all of these actions are possible in MS Word.

All the actions from the above will be added and are considered as actions that can be performed on tables in Word.

What are tables in Word?

There are rows plus columns in a table. A compartment is a point where a row, as well as a column, meet. Tables have many more functions in addition to being frequently used to arrange facts and figures. It helps in making the data in a sorted order which means that the data will be according to the table.

adding rows feature is included in Wordadding columns  feature is included in Worddeleting rows feature is included in Worddeleting columns feature is included in Wordchanging column width feature is included in Wordaligning tables  feature is included in Wordconverting tables to text  feature is included in Wordconverting tables to graphs feature is included in Word

Learn more about  tables in Word, here:

https://brainly.com/question/26344744

#SPJ2

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.

Answers

Portfolio. can you mark brainiest answer?

A database application is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. Thus option B is correct.

What  is Reports?

A report refers to any document or statement which provides information about any particular subject, or issues to the reader about any particular situation based on facts and supporting evidence.

Computer software known as a database application has as its main function the extraction of information from a digital database. As they offer a practical means of managing big volumes and various kinds of data, it is crucial for organizations.

It makes it simple to show how activities in one area of the company affect other areas, implementing a database management system will help you create a more detailed picture of your operations.

Therefore, option B is appropriate.

Learn more about Reports, here:

https://brainly.com/question/14969693

#SPJ6

The complete question is Probably

A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.

A) metadata table

B) database application

C) database hierarchy

D) dimension table

What computer system was the first to run the unix operating system?

Answers

The Digital Equipment Corporation PDP-7 system was the first to run Unix as an operating system in 1969. Ken Thompson wrote the operating system on this computer. The PDP-7 is an 18-bit mini computer, first developed in 1965. This computer was considered inexpensive yet powerful at its time of development.

Horizontal scaling of client/server architecture means _____.

Answers

Horizontal scaling of client/server architecture means that more machines or more client workstation are added in the network. The impact on the network should be small and negligible. 
Vertical scaling on the other hand means that more power (processing units) are added in the network. 

A __________ is a collection of modems and other equipment in a local area that acts as an isp's gateway to the internet.

Answers

An point of presence (PoP) is a collection of modems and other equipment in a local area that acts as an ISP's gateway to the internet.  ISP stands for Internet Service Provider - the company that connects the client through his communications line to its servers, or central computer, which connects client to the internet via another company’s network access points.   The PoP is the interface point between communicating entities. 

Voip uses ________ technology similar to email to transmit voice over the internet. digital

Answers

The answer to this question is Digital technology.

Digital technology refers to the software and hardware that are used in our homes, schools, and offices which are evolving. Digital technologies are electronic tools like online games, social media, and mobile devices. Digital technology comprises of electronics like fast computers, portable devices, and networks with higher connections.

Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who is using the correct disk for its purpose? 

       A. Only Carlo is correct.   B. Neither Carlo nor Liz is correct.   C. Both Carlo and Liz are correct.   D. Only Liz is correct.

Answers

A. Only Carlo is correct.

CD-R drives once burned cannot be reused, however CD-RW can be rewritten for up to 1000 times.
Other Questions
When it comes to analyzing organizations what must commanders consider in terms of mission? How many significant figures are there in the measurement 0.003 kg? A.1 B.2 C.3 D.4 Urn A has balls numbered 1 through 6. Urn B has balls numbered 1 through 4. What is the probability that a 4 is drawn from A followed by a 2 from B? Which of the following is true about unemployment rates during the Great Depression?A) Unemployment rates were low.B) Unemployment affected all races equally.C) Unemployment was not a problem because the demand for goods was high.D) Unemployment rates among African Americans were higher than unemployment rates among whites. Place the events in order from earliest to latest. A Battle of Fort Sumter, battle of Gettysburg, General Lee surrenders, Florida secedesB Florida secedes, battle of Fort Sumter, battle of Gettysburg, General Lee surrendersC Battle of Fort Sumter, Florida secedes, battle of Gettysburg, General Lee surrendersD Battle of Fort Sumter, Battle of Gettysburg, Florida secedes, General Lee surrenders A pinic table is 1 meter across. An ant is 1 centimeter in length. How many ants of the same length would fit end-to-end across the length of the pinic table To fit between two windows, the width of a bookshelf must be no greater than feet. Mrs. Aguilar purchases a bookshelf that is 77 inches wide. Which statement describes the relationship between the width of the bookshelf and the distance between the windows? What is the current yield for a $1,000 corporate bond that pays 7.5 percent and has a current market value of $950? According to David Taylor of the bank administration institute, about _______ percent of households with annual incomes over $50,000 have PCs equipped with modems A. 30B. 40C. 50D. 60 The entry of bile and pancreatic juice into the duodenum is controlled by Help! question down below! A television commercial for McDonald's is an example of which type of source? A. Visual/alternative media B. Field research C. Print D. Electronic Timothy attended a seminar on Egyptian heritage and culture. He saw a recreation of ancient images at the seminar. The images depicted the different Egyptian rituals of that time. What was the function or purpose of the images? Scientists have determined that light is made up of electromagnetic waves light is made up of particles called photons light is both a longitudinal wave and a particle both a and b A plane travel from California and back it took one hour long on the way out than it did on the way back the planes average speed was 300 miles an hour the average speed on the way back with 350 miles an hour how many hours did the trip take What are the three types of colonies england established in north america? Which phrase best completes this sentence?En un dormitorio, se ponen _______________.la estufa, el lavaplatos, y el microondasla silla, el silln, y el sofla cama, el clset, y las ventanasla tina, y el lavamanos After you look at the poetic devices in a poem, what should you do next in order to analyze the poem?a.read the poem.b.paraphrase the poem.c.determine the theme.d.determine the tone. The lines 2x - 3y = 1 and 2x + 3y = 2 are intersecting. true or false 300-297+294-291+288-285+...+6-3 Steam Workshop Downloader