1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
1 year ago
8

DRAW A FLOWCHART THAT WILL ASK THE USER TO ENTER AND DISPLAY THEIR PERSONAL DETAILS SUCH AS NAME AND AGE.

Computers and Technology
1 answer:
svet-max [94.6K]1 year ago
4 0

A flowchart is a diagram that shows how a system, computer algorithm, or process works.They are frequently used in many different fields to examine, organize, enhance, and convey frequently complex processes in simple, understandable diagrams.

How are flowcharts created?

  • Drag a flowchart shape from the selection menu onto the drawing page.
  • Point to the form and then point in the direction of the arrow pointing to the following shape you want to add.
  • Choose the shape you want to include. These four typical forms are excellent for outlining organizational structure, how various departments interact, and economic, industrial, or administrative operations.
  • The Workflow Chart or Workflow Diagram. The Process Flowchart or Communication Flow Chart.Swimming Lane Flowchart.Data flow diagram. A process is graphically represented in a flowchart.
  • It is a diagram that uses symbols, lines, and shapes to show the workflow necessary to do a task or collection of tasks.
  • In many different industries, flowcharts are used to research, enhance, and communicate processes.
  • A flow chart shows the steps in a process and their order. It is sometimes referred to as a process flow diagram or process map.In quality improvement, there are two different kinds of flow charts used.A high-level flowchart that lists six to ten significant steps provides a general overview of a process.

        To learn more about flowchart refer

        brainly.com/question/6532130

         #SPJ1

You might be interested in
Write a program that calculates and displays the amount ofmoney available in a bank account that initially has $8000 deposited i
Leviafan [203]

Answer:

Written in Python

import math

principal = 8000

rate = 0.025

for i in range(1, 11):

    amount = principal + principal * rate

    principal = amount

    print("Year "+str(i)+": "+str(round(amount,2)))

Explanation:

This line imports math library

import math

This line initializes principal amount to 8000

principal = 8000

This line initializes rate to 0.025

rate = 0.025

The following is an iteration from year 1 to 10

for i in range(1, 11):

    This calculates the amount at the end of the year

    amount = principal + principal * rate

    This calculates the amount at the beginning of the next year

    principal = amount

    This prints the calculated amount

    print("Year "+str(i)+": "+str(round(amount,2)))

6 0
4 years ago
Collins and quillian explained the results of priming experiments by introducing the concept of _____ into their network model.
insens350 [35]
<span>Spreading Activation This is a model of working memory, which can be otherwise called here and now memory in lay man's term, that tries to clarify how the mind forms related thoughts, particularly semantic or verbal ideas. The spreading enactment show is one way intellectual clinicians clarify the preparing impact, which is the noticeable wonder that a man can all the more rapidly review data about a subject once a related idea has been presented. As indicated by this model, semantic long haul memory comprises of a huge, interrelated system of ideas. At the point when a man is given any idea, the ideas most firmly associated with it are initiated in that individual's psyche, getting ready or "preparing" him or her to review data identified with any of them</span>
4 0
4 years ago
Consider the following definition of a recursive method. public static int mystery(int[] list, int first, int last) { if (first
ozzi

Answer:

c. 27

Explanation:

  • In recursion method, a method calls itself until a condition becomes true and returned back. In mystery(), at first time, first is 0 and last is 4. Condition is checked and 0!=4 so else part is executed in which again mystery is called with first as 1 and last 4. This will go again and again until first=4.
  • When first=4 it is also equal to last so if part is executed and alpha[4] is returned which is 9, now it comes alpha[3] +9 which is 8+9 =17 .
  • It is returning values to its previous calls that is why it will reduce to alpha[0]+alpha[1]+alpha[2]+17 which is nothing but sum of all elements of a alpha
  • Then, 1+4+5+8+9=27.
5 0
3 years ago
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred
horrorfan [7]

Answer: Training period

Explanation:

The training period is refers to the period of time where we can monitor all the network traffic and also observe all the networking behavior with the constitute.

  • During the training period we get a proper training about the specific topic and also get a chance to learn various types of things.

 According to the given question, in the training period an IDPS monitor is used observing the networking traffic and the network behavior. Therefore, raining period is the correct answer.

 Therefore, Training period is the correct answer.

5 0
3 years ago
Making phone calls with a public box
AfilCa [17]

Answer:

ja ok it is so eassssy.........................

8 0
3 years ago
Other questions:
  • ________is a Windows software program with powerful accessibility solution that reads information on your screen using synthesiz
    9·1 answer
  • With which type of media are you interacting when you read an online shopping website?
    7·1 answer
  • In this exercise, use the following variables : i,lo, hi, and result. Assume that lo and hi each are associated with an int and
    9·1 answer
  • after installing a second hard drive what needs to be done to the hard drive and what do these 2 tasks do?
    13·1 answer
  • If a*b = 2a - 56, calculate the value of<br>3 * 4​
    14·1 answer
  • Business intelligence is gained through industrial espionage and the gathering of this information often includes illegal or une
    7·1 answer
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget th
    12·1 answer
  • I NEED HELP ASAP!
    6·2 answers
  • Each web site contains a(n) ____ page, which is the first document users see when they access the site.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!