After launching the Mail Merge task pane, the first step is to Identity the main document.
Identify the main document as the first step
The first step is to choose a "document type" in the Mail Merge task pane, which determines the type of mail-merge you want to perform: form letters, e-mail messages, envelopes for mass mailings, labels for mass mailings, or a directory (a list or catalog).
There are six steps in the Mail Merge Task Pane -
Select the document type.Start the document.Select recipients.Write your letter.Preview your letters.Mail merge using an Excel spreadsheet?
The column names in your spreadsheet correspond to the field names in your mail merge. To address readers by their first name in your document, for example, you'll need separate columns for first and last names.
All data to be merged is present in the first sheet of your spreadsheet.
Data entries containing percentages, currencies, and postal codes are formatted correctly in the spreadsheet so that Word can read their values.
The Excel spreadsheet that will be used in the mail merge is saved locally on your machine.
Changes or additions to your spreadsheet are made before it is linked to your Word mail merge document.
To know more about Mail Merge task, visit: https://brainly.com/question/20904639
#SPJ13
write a program that asks the user for a file name and a string to search for. the program should search the file for every occurrence of a specfied string. when the string is found, the line that contains it should be displayed. after all the occurrences have been located, the program should report the number of times the string appeared in the file.
Just use grep command to look for such pattern supplied either by Pattern parameter in the given file, writing each line that matches to standard output.
What is the program?The program which asks the user for filename and to search for a string is :
#include <iostream>
#include <fstream>
#include <string>
using namespace std;
int main()
{
string fileName,
buffer,
search;
int count = 0;
cout << "Enter the name of a file: ";
cin >> fileName;
fstream file(fileName, ios::in);
if (!file)
{
cout << "Error opening file.\n";
return 0;
}
cout << "Enter a string to search for in the file \""<< fileName << "\".\n";
cin >> search;
cout << "\nString: " << search << endl;
cout << "All lines in file that contain the string:\n";
file.seekg(0, ios::beg);
while (!file.fail())
{
getline(file, buffer);
if (buffer.find(search,0) < buffer.length())
{
cout << buffer << endl;
count++;
}
}
cout << "Numer of times the string appeared in file: " << count << endl;
file.close();
return 0;
}
To learn more about CPP program refer to :
https://brainly.com/question/13441075
#SPJ4
question 7 when writing a query, you must remove the two backticks around the name of the dataset in order for the query to run properly.
When adding data sources using Design view, hence removing the two backticks is a false statement.
What is a query design command?A relationship in Access lets you combine data from two different tables. Each connection is made up of corresponding fields from two different tables.
For instance, you may have a Product ID record in a table of goods and an order Details database.
Therefore, you may create a self-join query by adding a table to the query twice and connecting a field from the first copy of the table to a different field from the second copy of the table, hence given statement is false.
Learn more about command, here:
https://brainly.com/question/29243066
#SPJ1
which of the following is not a typical role for a computer scientist on a development team? a.) systems administrator b.) database administrator c.) computer engineer d.) programming language specialist
Computer Engineer is not a typical role for a computer scientist on a development team.
What is a Computer Engineer?
A computer engineer is someone who combines electrical engineering and computer science to create new technology. Modern computers' hardware is designed, built, and maintained by computer engineers.
These engineers are concerned with safely and efficiently integrating hardware and software in a unified system. Computer engineers, cybersecurity professionals, and systems analysts are the second-largest category of tech jobs, according to CompTIA.
In addition to personal devices, computer engineers contribute to the development of robotics, networks, and other computer-based systems. This position entails a significant amount of research and development, testing, and quality assurance. Problem solvers and technology enthusiasts may be drawn to computer engineering.
Computer engineers collaborate with software developers and other tech professionals as part of a team. The field necessitates strong foundations in science and mathematics, and the majority of employees have a related bachelor's degree. Certifications in software, programming languages, or hardware systems can open up new doors for employment.
To learn more about Computer Engineering, visit: https://brainly.com/question/24181398
#SPJ1
you need to implement a wireless network link between two buildings on a college campus. a wired network has already been implemented within each building. the buildings are 100 meters apart. which type of wireless antenna should you use on each side of the link? (select two.)
Parabolic high-gain is the type of antenna that we will use on each side of the link to implement a wireless network link between two buildings on a college campus.
What are Wireless antennas?
Wireless antennas are radio communications system components that radiate and/or collect radio frequency energy.
A Wi-Fi device's connection range is determined by the antenna power gain. Gain is a numerical quantity measured in relative decibels (dB) that represents an antenna's maximum effectiveness in comparison to a standard reference antenna.
How are Wireless Antennas used?
Wireless antennas are typically connected to an amplifier, splitter, filter, or directly to a wireless access point or router via low loss coaxial cable. Wireless antennas are frequently attached to a mast or the side of a building via mounting clamps for outdoor applications. Indoor wireless antennas are typically ceiling mounted or mounted high up on a wall.
To learn more about Wireless Antennas, visit: https://brainly.com/question/13068622
#SPJ1
These statements describe LANs. SELECT ALL THAT APPLY
1) are not able to connect to the Internet
2) connect networks over a large geographic area
3) don't have to be connected to other networks
4) located in one building or adjacent buildings
5)wires connecting the network owned by the organization
Local area networks connect computers and give users shared access to printers, data, and other resources. Peer-to-peer or client-server architectures are the two main types of local area network architecture. Thus, option B, D, E is correct.
What is the significance of local area network?Computers may swiftly and readily exchange data and messages using local area networks. This expedites the process and saves time.
Therefore, Any user on the network can send and receive messages and data using LAN. Users can access the server-stored data via the network from any computer.
Learn more about local area network here:
https://brainly.com/question/1167985
#SPJ1
which task area best represents the actions below? analyzing the skill of an attacker organizing a public relations posture determining the type of attack classifying a victim system
The task area that best represents the actions below is option C: determining the type of attack.
How does system base attack work?This particular malicious software program spread throughout computer files without the user's knowledge. When it is executed, this malicious computer program copies itself and inserts copies of itself into other programs.
Note that Cyberattacks aim to disable, disrupt, demolish, or take control of computer systems, as well as to change, block, delete, manipulate, or steal the data stored within these systems. Any person or organization can launch a cyberattack from any location using one or more different attack strategies.
Learn more about System attack from
https://brainly.com/question/28482553
#SPJ1
true or false? virtual worlds are intended for their users to inhabit and interact with. today the term has become largely synonymous with interactive 3d virtual environments, where the users take the form of avatars visible to others graphically.
The phrase "virtual worlds" refers to interactive 3D virtual environments where users assume the form of avatars that are graphically visible to other users and are designed for them to inhabit and interact.
What is the meaning of virtual world?A virtual world, also known as a virtual space, is a computer-simulated environment that may be inhabited by a large number of users. Each user can create an avatar, and they can all independently and concurrently explore the virtual world, take part in its activities, and interact with other users. A 3D or 2 12 D online environment where users can interact with the world or with other users via an avatar is referred to as a virtual world.Virtual worlds are frequently long-lasting settings in which a lot of people can interact. Users of virtual worlds communicate with one another using fictitious versions of themselves known as "avatars." A virtual world is a computer-simulated depiction of a world with certain spatial and physical properties.The goal of contemporary virtual worlds is different from that of classic video games. Virtual reality simulations fall into three main categories: non-immersive, semi-immersive, and fully-immersive.To learn more about virtual world refer
https://brainly.com/question/13873769
#SPJ4
which blocks of code will properly navigate the robot to the final destination of the grey square in the bottom right corner of the grid without making it run into the wall or a black square?
The robot will correctly move to the gray square in Grid I even though the program won't move it to the gray square in Grid II.
What are the main parts of a robot?A robot's body/frame, control system, manipulators, and drivetrain are its constituent parts. The body or the frame may be any size and shape. In essence, the body/frame serves as the robot's framework.For years 1 through 5, the number of registered users almost quadrupled each year, and then it grew at a roughly consistent rate after that.The Action Your robot may move forward, backward, turn, or stop by using the steering block.The components of the robot that carry out the work are called effectors. Any tool that you can mount on your robot and operate with its computer is an effector. The effectors are typically tailored to the jobs that you want your robot to perform.To learn more about parts of a robot refer to:
https://brainly.com/question/19584695
#SPJ4
Which of the following statements is true about dictionaries?
A) Dictionary keys are immutable.
B) It is not possible to update the entries of a dictionary.
C) Keys can change, but values cannot.
D) One key can correspond to more than one value
The statement that is true about dictionaries is option A) Dictionary keys are immutable.
Do dictionaries change or remain the same?A dictionary is a changeable, unordered Python container used to store mappings between distinct keys and values. Curly brackets () are used for dictionaries, as well as key-value pairs with commas between them (,).
Note that A dictionary's keys cannot be accessed using its values, but its values can be obtained using its keys. Since dictionaries themselves are mutable, entries can always be added, deleted, or modified.
Therefore, an immutable type must be used for a dictionary key. An integer, float, text, or Boolean value, for instance, can be used as a dictionary key. However, since dictionaries and lists are both mutable, neither one can act as a dictionary key for the other.
Learn more about dictionaries from
https://brainly.com/question/896784
#SPJ1
in a network that requires high availability administrators often configure switches in a redundant topology ensuring that if one path to a destination is broken, another path can be used. there are two problems that must solved in this scenario. what are they?
Messages are broken up into packets and sent individually over the network to their destination when using packet switching.
The packets could follow several routes to their destination, so they could show up at the switch at any time. To determine the quickest route between two networks, the Routing Information Protocol (RIP) uses "hop count," which refers to the number of routers a packet must pass through. Algorithms are employed in dynamic routing to compute numerous potential routes and identify the optimum path for traffic to follow through the network. It employs link state protocols and distance vector protocols, two classes of sophisticated algorithms. Circuit switching is one of three frequently used switching methods. Switching of packets. Switching messages.
Learn more about network here-
https://brainly.com/question/13174503
#SPJ4
which is not a step to prevent your car from being stolen? park in areas that are not traveled much. always lock all doors. don't leave any valuables in sight. install tapered interior door lock buttons
The step that is not to prevent your car from being stolen is park in areas that are not traveled much.
Even the most cautious motorist may encounter an emergency. Utilize common sense and these recommendations to prevent keep yourself safe:
The actions below should be followed if your automobile should break down and you are not close enough to one of your safe spots:
Even if you have to drive on a flat tire, pull over and move off the road so you are not in the way of incoming traffic. The tire can be changed.
Your emergency flashers should be on. If your trunk contains emergency road flares, make sure to prominently display them.
Raise the hood, then fasten a handkerchief to the door handle or aerial.
Use a roadside phone or call box if one is available. If not, wait for assistance while sitting in your locked car.
To know more about prevent click here:
https://brainly.com/question/14938514
#SPJ4
while assisting a windows user over the phone, you need to determine the ip address for the dhcp server along with the mac address of the ethernet nic. the user has successfully opened a command prompt. what command will you have the user type at the command line to determine these two addresses?
The command that you will have the user type at the command line to determine these two addresses is ipconfig / all.
(Internet Protocol CONFIGuration) A command-line tool used to view and control the machine's allocated IP address. The current IP, subnet mask, and default gateway addresses of the computer are shown in Windows when you type ipconfig without any other options.
Some computer operating systems have a console application program called ipconfig (short for "Internet Protocol configuration") that displays all current TCP/IP network configuration values and updates DNS and DHCP (Dynamic Host Configuration Protocol) settings.
The ability to force the host computer's DHCP IP address to be refreshed in order to request a different IP address is a significant additional feature of ipconfig. For this, two commands must be used sequentially.
To know more about ipconfig click here:
https://brainly.com/question/28258470
#SPJ4
when we wrote programs to interact with web apis and expected to receive text, we explicitly specified an encoding called utf-8.why was it important for us to specify an encoding?how do you think, in a practical circumstance, we would be able to find out what the appropriate encoding would be, if we weren't blindly assuming that utf-8 was the correct encoding?what to submit
Specifying encoding is very important because it serves as a character set for the document. If it is not done, the process will be idle and HTML parsing will not start early.
Another reason to specify it is to ensure that data is properly translated for consumption in other systems as well. For instance, special characters or binary data may occasionally be displayed on a web page. Data will be correctly utilized and will not be alien by way of encoding.
In practical circumstances, it is essential to notice the number of bytes used for data representation. To decide which one is appropriate, one can check the browser support for the selected encoding. There will be names of the encoding that should not be used.
What is encoding?
Encoding is the process of arranging a string of characters (letters, numbers, punctuation, and some symbols) in a particular format for quick transmission or storage. The process of converting an encoded format back into the original string of characters is known as decoding.
What is utf-8?
A Unicode character encoding technique is UTF-8. This means that UTF-8 converts a Unicode character's code point into a string of binary data. Additionally, it reads binary digits and converts them back to characters in the opposite direction.
Learn more about Encoding click here :
https://brainly.com/question/19746078
#SPJ4
simple parity checks can detect any odd number of errors in a bit stream. group of answer choices true false
It is true that simple parity checks can detect any odd number of errors in a bitstream.
A sequence of bits is referred to as a bitstream, sometimes known as a binary sequence. A series of bytes is known as a bytestream. Since a byte is often an 8-bit quantity, the term "octet stream" is occasionally used interchangeably. There is no specific and direct translation between bitstreams and bitstreams because one octet can be encoded as a series of 8 bits in a variety of different ways (see bit numbering).
Both computing and communications make heavy use of bitstreams and bytestreams. For instance, Transmission Control Protocol transmits a synchronous bitstreams while SONET carries synchronous bitstreams.
In reality, bits treams are not directly encoded using bitstreams; instead, a communication channel may employ a signaling technique that is not directly based on bits.
To know more about bitstream click here:
https://brainly.com/question/17618984
#SPJ4
what is the ipv6 prefix of the address 2001:00cb:1562:0dc3:5400:0001:24a0:0014 if the prefix length is /56
2001:00cb:1562:0d:
Moreover, An IPv6 address prefix is a combination of an IPv6 prefix address and prefix length used to represent a block of address space (or network), similar to using a combination of IPv4 subnet address and netmask to specify a subnet. An IPv6 address prefix has the form ipv6-prefix/prefix-length.
You can learn more about this at:
https://brainly.com/question/29312398#SPJ4
In the eye on oversight video case study, what was the name of a ransomware software that impacted the united kingdom national health service in 2017?.
In the 'Eye on Oversight' video case study, the 'Wan-naCry' ranso-mware software impacted the United Kingdom National Health Service in 2017.
'Wan-naCry' is an example of crypto-ranso-mware. It is a type of malicious software used by cyber attackers to extort money. 'Wan-naCry' ranso-mware software spread rapidly across a number of computer networks in May of 2017. After infecting a Windows computer, it encrypted files on the computers' hard drives, making them impossible for users to access, then demanded a ransom payment in bitcoin in order to decrypt them.
By the 'Wan-naCry' ranso-mware around 200,000 computer devices were infected across 150 countries, where the four most affected countries were Ukraine, India, Russia, and Taiwan.
You can learn more about rans-omware at
https://brainly.com/question/27312662
#SPJ4
where in a router is the destination ip address looked up in a forwarding table to determine the appropriate output port to which the datagram should be directed?
At the output port leading to the next hop towards the destination.
These are tables that explain how a frame will be continued out of a given switch or router in the network. These tables work by suited particular header fields, such as the IP destination address, and when a match happen, forwarding the frame to a particular egress port. The main aim of a router is to continue a packet toward its destination network, which is the destination IP address of the packet. To do this, a router required to seek the routing information stored in its routing table. The routing table consist network/next hop associations. There are four components of router, namely: input ports, output ports, a switching fabric, and a routing processor. An input port can be described as the point of attachment for a physical link and is the point of entry for incoming packets.
Learn more about a router at https://brainly.com/question/15851772
#SPJ4
Which process exports a database into a format that can be read by another program like a spreadsheet?
A database management system (DBMS) is a piece of software that is used to construct and administer databases.
What is the general term for software that creates and manages database?A piece of software called a database management system (DBMS) is used to create and maintain databases. A single user can use it for personal usage, or a large group of users might use it for business purposes.The database's underlying data can be accessed by users, who can also interact with it. These activities might range from simple data queries to creating database schemas that have a significant impact on the database structure. It can be used personally by a single person or corporately by a large number of users.A group of applications for storing and retrieving data. A collection of connected data that includes tools to store and access that data in a quick and efficient way is known as a database management system, or DBMS.To Learn more About database management system refer to:
https://brainly.com/question/24027204
#SPJ4
what does the vlan trunk protocol (vtp) do? group of answer choices it shares trunking information amongst switches that participate. it shares vlan database information amongst switches that participate. it is the protocol used by a trunk port for establishing a trunk with another switch. it is the protocol that defines how vlan tagging is accomplished in an ethernet network
It shares VLAN database information amongst switches that participate.
What do you mean by database?
A database is a planned grouping of material that has been arranged and is often kept electronically in a computer system. A database management system often oversees a database (DBMS).
Networks can convey network functionality through all of the switches in a domain using the virtual local area network (VLAN) trunking protocol, or VTP, a proprietary Cisco technology. This method does away with the requirement for various VLAN setups across the system.
VTP, a feature of Cisco Catalyst products, offers effective means of routing a VLAN through each switch. Additionally, VLAN pruning can be used to prevent traffic from passing through certain switches. These systems can be configured to allow or disallow trimming by users.
One idea behind VTP is that larger networks would require restrictions on which switches will serve as VLAN servers. VTP provides a number of alternatives for post-crash recovery or for effectively serving redundant network traffic.
VLAN trunking is conceptually comparable to other forms of IT trunking. By placing resources in specified configurations, managers can reduce the amount of labor that data must through to reach certain areas of a network system.
Learn more about VTP click here:
https://brainly.com/question/9981556
#SPJ4
what are all the non-trivial functional dependencies in the closure that have only one attribute on the right side?
The right side of production is referred to as the dependant, while the left side of FD is referred to as a determinant.
In a database, what does reliance mean?A constraint that applies to or outlines how characteristics relate to one another is known as a dependency. When data from one database table uniquely determines data from another database table, this is referred to as cross-table determination.A child, stepchild, sibling, parent, or brother or sister are a few examples of dependents. If they fulfill the filing criteria, people who are eligible to be claimed as dependents might need to file a tax return.A constraint that applies to or outlines how attributes relate to one another is known as a dependency.To learn more about Dependency refer to:
https://brainly.com/question/24301924
#SPJ4
when writing shell scripts and using an if statement to determine whether a set of code should be executed, what is the proper syntax to end the if construct? question 27 options:
When writing shell scripts and using an if statement to determine whether a set of code should be executed, the proper syntax to end the if construct is fi.
What does an if statement mean?A program is guided to make decisions based on predetermined criteria using the IF statement, which is a decision-making statement. If a certain condition is satisfied (TRUE), one piece of code is run, and if it is not, another set of code is run, and so on.
Conditionals are programming language directives used in computer science to handle decisions. If a programmer-defined boolean condition evaluates to true or false, conditionals will execute a different computation or take a different action.
Therefore, For example, if (score >= 90) grade = "A," the following example will demonstrate that the number is positive if its value is greater than or equal to 0. Number is negative is displayed if the value of the number is less than 0.
Learn more about if statement from
https://brainly.com/question/27839142
#SPJ1
a logical address space consisting of 4 pages of 4096 words each and is mapped onto a physical memory of 64 frames. (a) determine the size of the logical address. (b) determine the size of the physical address.
Physical addresses contain 15 bits, while logical addresses have 16 bits. On the other hand, a physical address provides location information.
Physical address refers to a program participant's home address, place of employment, or place of attendance. A person's street, street number, and municipality make up their physical address.
A 64-page logical memory unit.
= 2⁶ pages
word count divided by 1024 equals 210
Thus, total logical memory equals 26 x 210, or 216.
A logical address will therefore have 16 bits.
Physical memory equals 32 frames.
25 frames is word count divided by 1024 equals 210
Therefore, the entire physical size is 25 x 210, or 215
Consequently, the physical address will have 15 bits.
Learn more about address here-
https://brainly.com/question/16011753
#SPJ4
On a pc, what computer command is used to quickly save a file as another copy of that file?.
Answer:
Ctrl+S
Explanation:
This command is used to quickly save a file.
Hope this helps!
which of the following database structures stores information in a tree-like structure that allows repeating information using parent/child relationships, in such a way that it cannot have too many relationships? group of answer choices hierarchical database network database relational database model all of the above
Hierarchical database is the data structure stores information in a tree like structure .A hierarchical database model is one where the data are structured in a way that resembles a tree.
What is Hierarchical database?A data model in which the data are arranged in a tree-like form is called a hierarchical database model. The information is kept in records that are linked to one another by links. A record is a group of fields, each of which has a single value.
A hierarchical database is a type of data architecture in which information is kept in records and arranged into a parent-child structure that resembles a tree, with one parent node having several child nodes that are connected by links.
Geographical data and file systems are the two main uses of the hierarchical structure in modern computing. Currently, hierarchical databases are still widely used, particularly in applications like banking, healthcare, and telecommunications that demand extremely high performance and availability.
To learn more about hierarchical database refer to:
https://brainly.com/question/6447559
#SPJ4
The data structure known as a hierarchical database organizes information into a tree-like structure. When the data are organized in a way that resembles a tree, the database model is said to be hierarchical.
What is Hierarchical database?A hierarchical database model is one in which the data are organized in a tree-like structure. Records containing the information are connected to one another through links. A set of fields, each with a single value, make up a record.A hierarchical database is a sort of data architecture where data is stored in records and organized into a tree-like parent-child structure, with one parent node having many child nodes that are connected by links.The two primary applications of the hierarchical structure in contemporary computing are file systems and geographic data. Hierarchical databases are still used extensively today, especially in industries like banking, healthcare, and telecommunications that require extremely high performance and availability.To learn more about hierarchical database refer to:
brainly.com/question/6447559
#SPJ4
Even after a game has been released a game studio decides to update it on a regular basis why is this a good idea
Even after a game has been released and a game studio decides to update it on a regular basis, it is a good idea because by updating it, it fix bugs, new features will be included and make the game more appealing.
Why do we need to update the game?For bug corrections and new features, most games will get updates. Some games allow you to continue playing even if you haven't updated, but they often forbid any online functionality until you have.
The term "Game Updates" refers to any updates, corrections, and upgrades made available to third parties or end users that the Company makes available for use by any end user while playing the Game.
Therefore, In most cases, fixes to the game data are distributed using a third-party binary diff mechanism. Typically, the executables are short enough to be distributed in its entirety quickly. Many contemporary games contain hundreds of megabytes of game data (mostly textures, models, levels data etc).
Learn more about game from
https://brainly.com/question/908343
#SPJ1
because the binarysearch() method requires that array elements be sorted in order, the method is often used in conjunction with it
The Sort() method is frequently used in conjunction with the BinarySearch() method because it needs the array elements to be sorted in the right order.
Only on a list of items that has been sorted can binary search be used. We must first sort the elements if they are not already sorted.
In the Array you can use the method's Sort() to see how encapsulation is done.
The binary search algorithm is used by the Arrays.binarySearch() method to search the specified array of the given data type for the specified value.
Prior to making this call, the array must be sorted using the Arrays.sort() method. If it isn't sorted, the outcomes aren't clear. There is no guarantee that the element with the specified value will be found if the array contains multiple elements with that value.
The binary search algorithm uses binarySearch() function to look for the specified value within the given array of bytes.
To learn more about BinarySearch() click here:
brainly.com/question/16631818
#SPJ4
android is a software product developed by that allows cell phone manufacturers to control hardware and establishes standards for developing and executing applications on its platform. android is thus an example of a(n) .
Answer: Operating system (OS) ?
Explanation:
This is the best guess I could give without the lesson.
how does the color of studio curtains affect a production? what color is most often used?
Answer:red
Explanation:
your enterprise ran out of computing resources due to the increasingly high rate of stored data. you are asked to choose a cloud model in which your enterprise can have the most control over the hardware. which model should you choose?
Should choose the model is Infrastructure as a service.
What is infrastructure as a service means?A specific kind of cloud computing service known as infrastructure as a service (IaaS) provides basic computation, storage, and networking resources on demand and on a pay-as-you-go basis. IaaS is one of the four categories of cloud services, along with serverless, platform as a service, and software as a service (SaaS).The following is the official IaaS definition: In place of conventional on-premises data center infrastructure, infrastructure as a service (IaaS) offers computation, memory, storage, networking, and related software, such as operating systems and databases, as a cloud service.To learn more about infrastructure as a service refer to:
https://brainly.com/question/13465777
#SPJ4
given two implementations of sparc, one with only four sets of registers in the circular register file, and one giant one with 32 sets, can you run the same compiled binary on both processors?
No, it isn't. Machine language is used to encode the CPU's programs. The machine language for x86 and ARM does not have the same instructions, and the encoding is extremely different.
It is possible to think of machine code as either a simple and hardware-dependent programming language or as the lowest-level representation of a built or assembled computer program. Machine code is a strictly numerical language that is intended to run as quickly as feasible. Machine language and assembly language are not portable and are hardware-specific. This means that in order for a program to execute on another computer, the machine code that was utilized to run it on the first computer must be changed. A high-level language's portable code can execute unchanged on numerous computers.
Learn more about machine here-
https://brainly.com/question/14417960
#SPJ4