Question Mode Matching Question Match the following description with the appropriate programming language generation. 1GL 1GL drop zone empty. 2GL 2GL drop zone empty. 3GL 3GL drop zone empty. 4GL 4GL drop zone empty. 5GL 5GL drop zone empty. Extremely advanced. Uses statements (scripts) rather than algorithms. High-level programming language. Uses a compiler to convert into machine language. Machine language. Represented by a series of 1s and 0s. Assembly language. An assembler converts 2GL into machine language. Specifically designed for creating database management programs.

Answers

Answer 1

Answer:

1GL: Machine language. Represented by a series of 1s and 0s.

2GL: Assembly language. An assembler converts 2GL into machine language.

3GL: High-level programming language. Uses a compiler to convert into machine language.

4GL: Specifically designed for creating database management programs.

5GL: Extremely advanced. Uses statements (scripts) rather than algorithms.

Explanation:

Programming languages started as a series of binary digits (i.e. 0's and 1'). This generation of language is referred to as the first generation.

However, the machine language were difficult to read by human, so mnemonics were created (i.e. assembly language). This language uses symbolic codes such as ADD for addition, etc. This is the second generation

The third generation are the high level languages that uses languages that can be easily understood by human, e.g. + means plus. However, the language must be translated; hence the need for a compiler or interpreter, as the case may be.

The fourth and fifth generations are extensions of the third generation languages. The fourth were created to connect to DBMS while the fifth are more advanced.


Related Questions

Your organization's IT department has developed a custom application that reports the hostname of each client that tries to access three servers in the accounting department that store sensitive information. You do a random test and find that the program is not reporting the host names for some clients even though it properly records their IP addresses. This is because the custom application submits reverse lookup requests to the DNS server to discover the host names for the specified IP addresses. As you investigate further, you learn that the clients whose hostnames could not be reported have static IP addresses and are on subnet 192.168.3.0. What should you do

Answers

Answer:

Configure DC1 to forward name resolution requests to 192.168.3.0

Explanation:

DC1 is configured in order to use forwarders so that they can send unresolvable host name requests to a DNS server at the main office or the head quarters.

This also prevent sending of DNS spoofing attack  to a DNS client

Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures

Please help ASAP

Answers

Answer:

clip art

Explanation:

i hope this helps you

java Consider the following problem statement. A cookie recipe calls for the following ingredients: 1.5 cups of sugar 1 cup of butter 2.75 cups of flour The recipe produces 48 cookies with this amount of the ingredients. Write a program that asks the user how many cookies he or she wants to make, and then displays the number of cups of each ingredient needed for the specified number of cookies. Format your output nicely that all numbers and decimals align as shown in the example! Limit decimals to four digits.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a program that asks the user how many cookies they want to make. Then it adjusts the original recipe based on the ratio of the original amount of cookies it makes to the amount the user wants. Finally, passing the output of the new adjusted recipe to the user. Due to technical difficulties, I have added the code as a txt file attached below.

Which term collectively describes hard disks, CDs, and flash drives?

Answers

Answer:

Auxiliary storage

Answer. Answer: Auxiliary storage is the term collectively describing the hard disks, CDs, and flash drives. Auxiliary storage is any storage which is made available through input / output channels to the device.

The part of an HTML document where the CSS file is linked is the..?
A) body
B) footer
C) header
D) paragraph

Answers

Answer:

C) header

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head.

The head (header) contains information such as version of HTML, title of a page, metadata, link to custom favicons and cascaded style sheet (CSS) etc.

On the other hand, the body of a HTML document contains the contents or informations that a web page displays.

Hence, the part of an HTML document where the cascaded style sheet (CSS) file is linked is the header. A style sheet can be linked to an HTML document by three (3) main methods and these are;

I. External style.

II. Inline style.

III. Embedded (internal) style.

Q1. Which implementation of Network Access Control checks users' credentials to determine what level of access they should have to a top-secret file?

A. ACE
B. DAC
C. MAC
D. RBAC

Q2. Which physical access control uses a portable device that authenticates a person's identity electronically by storing some sort of personal information?

A. Infrared scanners
B. Hardware security tokens
C. Biometric devices
D. Keypads

Q3. Which implementation of Network Access Control grants access depending on a specific job role?

A. DAC
B. RBAC
C. MAC
D. PAC

Q4. Which implementation of Network Access Control is more relaxed, allowing users to determine file access privileges?

A. AAC
B. MAC
C. DAC
D. RBAC

Q5. Which type of access control sets the standard for the way security actions unfold?

A. Identity
B. Management
C. Physical
D. Technical

Answers

Answer:

1. MAC

2. Biometric Devices

3. RBAC

4. DAC

5. Management

Explanation:

Q.1) Option c) MAC

Q.2) Option c) Biometric devices

Q.3) Option b) RBAC

Q.4) Option c) DAC

Q.5) Option b) Management

What is MAC ?

The ability of individual resource owners to allow or refuse access to resource objects in a file system is constrained by the security measure known as mandatory access control (MAC).

What is a biometric device ?

An authentication and security identification tool is a biometric gadget.

What is RBAC ?

Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system.

What is DAC ?

The idea behind discretionary access control is to limit access to things based on who the subject is.

Therefore, MAC, biometric device, RBAC, DAC and Management access control sets are some of the measures for network security and access control.

You can learn more about network security from the given link

https://brainly.in/question/33317398

#SPJ2

Select the correct answer.
A student is browsing a website. While browsing, he clicks on a link that takes him to another website. Which code gives the correct format of the
external link?

Answers

Answer:

(B) because on a website IT HAS TO HAVE "WWW." first

Other Questions
Please help me with this question The mean daily production of a herd of cows is assumed to be normally distributed with a mean of 36 liters, and standard deviation of 7 liters.A) What is the probability that daily production is less than 23.4 liters? Use technology (not tables) to get your probability.Answer= (Round your answer to 4 decimal places.)B) What is the probability that daily production is more than 45.7 liters? Use technology (not tables) to get your probability.Answer= (Round your answer to 4 decimal places.) qual o valor das expresses (-5) + (+6) + (-2)?(-22) - (+8) + (+10)?(-12) . (+4) : (-2)? Paige ran four miles a day last week. This week, she ran five miles a day. How did adding a mile most likely affect her workout? Which sentence is written in the passive voice? One side of triangle is 5x-2 another side is 6x+7 and t is the length of third side then what is true about length of t What is the one thing people assume about you that you wish wasnt true? Annabelle is in the grocery store when she notices her heart is racing, and she becomes very dizzy. She is shaking so that she is barely able to stand up, and she cannot seem to get enough air and begins to hyperventilate. Annabelle thinks that maybe she is having a heart attack or going insane. She was fine a few minutes ago. Annabelle is exhibiting symptoms of a(n) What is the best antonym for credible?A. Un knowledgeableB. StodgyC. AnalyticalD. FallaciousE. Plausible Which base word contains a syllable that changes pronunciation when the word part-ic is added? What does federal mean? Long essay questionEvaluate the extent to which the Renaissance changed European society.Please use actual historical evidence. 100 POINTS Solve for x.12x+13>35Drag and drop a number or symbol into each box to correctly complete the solution. (a+4)(a-2) please help solve for the unknown value 11. The radius of a circle H is 7.5 inches. Calculate the diameter of the circle.12. The radius of a circle is 8.2 centimeters. Calculate the circumference of the circle. Simplify the expression:73p+4p An ad for a dentist's office that asks viewers if they have ever scared away adate because of bad breath is: PLSS HELP ME CUS YES It is believed that 25% of U.S. homes have a direct satellite television receiver. How large a sample is necessary to estimate the true population of homes which do with 95% confidence and within 3 percentage points?