Hacker binary attack code

Types of Coding

Posted

in

by

gomariss


Computers receive bugs within programs. Code allows communication through symbols. Technology is based around code. How do you think you play video games? Where would we be without code on technology devices? People don’t think twice about the accessibility that allows them to do certain things on digital devices.

Throughout history, people have managed to have successful communication between various ways. Coding was used on cave walls to give a certain message. To add, that only the people that understood the symbols would understand. To add, morse coding was also used to share secret messages. On the other hand, digital coding used today helps computers and other machines function.

Picture of coding on a computer, with different layers throughout the programing.

Accessibility

An executable programs according to Teach Target is defined as “a computer file that contains an encoded sequence of instructions that the system can execute directly when the user clicks the file icon.” (What Is an Executable File (EXE File)?, n.d.). Along with the executable programs comes language. They are broken up into “high-level”, and “low-level_ languages.

In coding, the 2 types of languages helps machines react to humans. First, “high-level” language. From the University of Michigan Press, the chapter, “Toward the Rhetorical Study of Code”, it breaks down each purpose. In the text, “high-level” language, meaning that it is immediately more accessible to humans than to machines.” (Brock). According to this fact, English is the most attracted language to “high-level” language. In contract, “low-level” language is not very human friendly. This type of language does not give accessibility to use technology. The Michigan Press refers to the executable program is more trustworthy. This is because behind the screen of a computer. For example, it can allow people to “to perform particular activities, such as brows- ing the web, writing and saving text documents, calculating mathematical equations, verifying password correctness, and so on.” (Brock).


Comments

Leave a Reply

Your email address will not be published. Required fields are marked *