1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anit [1.1K]
2 years ago
15

11. Explain different types of program control with suitable flow chart. N

Computers and Technology
1 answer:
melamori03 [73]2 years ago
5 0

hi

Counting a sequence of statements without any decisions or branches as one control structure (as many computer scientists do),the if, if-else, and if-else-if ladders as one control structure,the three types of loops (while, do-while, and for) as three different control structures,the break and continue statements, in the context of loops, as one more (although this can be debatable),the switch/case control structure as one,the call/return mechanism as one,the ability to specify and call a callback function as one,the goto/label as one,and the setjmp/longjmp non-local goto as one,

You might be interested in
This is your code.
topjm [15]

Answer:

11

Explanation:

the second in the d aray is c because to call the first value, it is d[0]. So, to call c, you put d[2]. And the 0 of the c array, or the 0 of the 2 of the d array, it is 11

put it in a program. I use JS so if you have an Apple, open script editor and change the script from AppleScript to JavaScript and put in this code:

var a = [5, 10, 15];

var b = [2, 4, 6];

var C = [11, 33, 55];

var d = [a, b, C];

d[2][0];

3 0
3 years ago
Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it
sergij07 [2.7K]
Option D is correct. If we want multiple users to access data, we will organise that data in Database we can then be accessed whenever needed.
6 0
2 years ago
What are the main features cyber law of Nepal​
muminat

Answer:

What are the provisions of cyber law in Nepal?

Provision of cyber law of NEPAL

It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce. It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Hope this helps Have a good day

6 0
2 years ago
Contextual targeting method mean
Semenov [28]
Definition - What does Contextual Advertising mean? Contextual advertising is a form of online advertising that displays ads on websites based on the keywords, content or theme of the website. It is a targeted advertising technique that is commonly used in ads on blogs, websites and other online media.
3 0
2 years ago
The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agr
mamaluj [8]

Answer:

ISO standards

Explanation:

ISO / IEC 14443 is the ISO standard that covers RFID usage by devices.

EPCglobal - Electronics Product Code Global Incorporated is also another international standard that covers RFID. These two standards work together to standardize RFID products produced by manufacturers so that these products can be the same across different markets and manufacturers. Example I can purchase a tag from one manufacturer and a transceiver from another and they would function well together. There are also other standards for RFID but the above two are the biggest and most popular with ISO being the oldest.

4 0
2 years ago
Other questions:
  • Select the correct answer.
    15·1 answer
  • A type of memory that is expensive and therefore is often used only in cache memory applications.
    15·2 answers
  • Which company operates a public cloud?<br><br> Lotus<br> Acme<br> Google<br> Symantec
    5·2 answers
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    12·1 answer
  • A(n) __________ item is a hardware or software item that is to be modified and revised throughout its life cycle
    10·1 answer
  • . Write a short program that asks the user to input a string, and then outputs the
    15·1 answer
  • Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of
    8·1 answer
  • Who can add entries to value log
    8·1 answer
  • 7 steps in infographic design​
    6·1 answer
  • What is the output of:<br><br> print (8 % 4)
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!