1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firlakuza [10]
2 years ago
8

Which concept allows the computer to repeat a group of steps in an

Computers and Technology
1 answer:
allochka39001 [22]2 years ago
7 0

Answer:

A

Explanation:

I was gonna say 'loop' from my computing days. but it is now called iteration

You might be interested in
To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security
marta [7]

the answer is True

there has to be a balance between security and the user experience

7 0
3 years ago
What a suitable variable name to store the number of years old a person is
navik [9.2K]

age is a suitable variable name. It's descriptive and concise. Make sure it's lowercase.

8 0
3 years ago
What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?
nordsb [41]

Answer:

•The user can edit the chart directly. hoped i;m right

Explanation:

6 0
3 years ago
You wish to lift a 12,000 lb stone by a vertical distance of 15 ft. Unfortunately, you can only generate a maximum pushing force
miss Akunina [59]

Answer:

Full question?

Explanation:

Sorry for asking this but where's what you want answered?

8 0
3 years ago
Daniel would like to send a letter to more than one hundred people. He should type each letter separately.
emmainna [20.7K]
False is the answer to your question
7 0
3 years ago
Read 2 more answers
Other questions:
  • A subclass of Value, LargerValue, is defined with a getValue method that returns twice the value of the parent. Which line is th
    13·1 answer
  • What is a color that cannot be created by mixing other colors together?
    15·2 answers
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • A major difference between digital librarians and traditional librarians is that traditional librarians rarely work with people.
    15·2 answers
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • What did Adam and Eve look like?
    7·2 answers
  • Edhesive 8.5 code Practice help me pls
    15·1 answer
  • We can use formatting before and after typing.​
    8·1 answer
  • How do I type fast?<br><br> Give me an actual answer...
    11·2 answers
  • When designers follow accepted standards and protocols, which of the four basic characteristics of network architecture is achie
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!