1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Readme [11.4K]
3 years ago
6

Write a set of pseudocode instructions to feed a pet, using at least five steps? Thank you!!

Computers and Technology
1 answer:
stira [4]3 years ago
4 0
1.) Go get bag of pet food from cabinet

2.) Set the bag on counter

3.) Get pet food dish out of cabinet

4.) Open pet food bag, pour pet food into dish

5.) Close bag, give dish to pet.
You might be interested in
Which software is used to play, create, and modify audio and video files?
igor_vitrenko [27]
Video Editing software is used to play, create, and modify audio and video files. 
7 0
3 years ago
Read 2 more answers
What is one advantage of using the sharing tab vs. the security tab to give out permissions?
Hoochie [10]

Answer:

Depending on what operating system you have my best choice would be D since on some folders you can share permissions with other people. It really depends on what computer you're talking about.  

8 0
3 years ago
I need help. People who know computer science. I have selected a word from the first 1000 words in my dictionary. Using the bina
Rudiy27

Answer:

14

Explanation:

8 0
3 years ago
What changes have occurred over the last 25 years impacting how we use information systems and that increasingly require using e
Elden [556K]

Answer:

Follows are the solution to this question:

Explanation:

Throughout the presence of third-party companies that is attackers, cryptography is indeed a method of protecting information and communication.

Its cryptographic techniques are numerous, which are used for data security and encryption levels were defines, throughout all protocols.

Encryption - was its method for encoding a message and information. So, it can be viewed only by authorized parties.

They can search online for various data encryption. The changes over the last 25 years also actually occurred:

Cryptography is all around. Each time you make a phone call, buy something like that in a store or even on the Internet with a credit or debit card or receive money from an Atm is an authentication that helps secure and secures the payment.

Tausend years ago, codes or encryption were used to protect information. These encryption schemes have evolved from the past 25 years or say we are getting far better than that of the preceding one But cryptography was far more advanced with both the advent of computers than it used to be.

World War II would also see Enigma code, the perfect example of analog encryption.

Its computer design technology had also finally been enough to break its Enigma cipher, as well as Enigma texts, still are regarded as just a necessary component of the probable Affiliated successes.

Mathematical 128-bit cryptography has become a standard for several sensible computers and portable structures, far greater than every prehistoric or ancient plasterboard.

Without it.

AES - Another of our safest cryptography techniques is the Intensive Encryption System. The state-government uses it to protect classified information, that is used by all of our phones.

6 0
3 years ago
What are the four steps of the research process?
pishuonlain [190]

Answer:

Step 1: Identify the Problem

Step 2: Review the Literature. ...

Step 3: Clarify the Problem Step 4: Clearly Define Terms and Concepts.

7 0
3 years ago
Other questions:
  • What aspect of the internet makes it fault-tolerant?
    6·1 answer
  • Odbc works on the ____ operating system.
    5·1 answer
  • How can an individual find career data?
    13·1 answer
  • Cascading style sheets (css) use special hypertext markup language (html) tags to globally define font characteristics for a var
    6·1 answer
  • STEAM game launcher question.
    15·1 answer
  • Which of the following identifies the patterns used for each data series in a chart?
    12·1 answer
  • What will you see on the next line? >>> int(6.5)
    12·2 answers
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
  • Simplest way to start baking career is to attend_______.<br><br><br><br>​
    9·1 answer
  • The choice of database does not have any impact on the relevancy of search results?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!