1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
statuscvo [17]
3 years ago
14

Many websites ask for phone numbers. Write a Raptor flowchart which inputs a string containing a phone number in any format and

outputs it in the standard format.
Computers and Technology
1 answer:
Andrei [34K]3 years ago
5 0

Answer:

This problem consists in how you can search for the telephone number of x person in a directory. We try to make it as simple as possible, and in a general way; Without declaring variables or anything, we only did the process necessary to locate a number.

First we made the algorithm

1.Start

2.Go to the section of the municipality where the person lives

3.Locate the first letter of the first surname.

4.Locate the full last name

5.Find the second last name

6.Find the person's name

7.Find the phone

8.End

To make the flowchart we use 'Raptor'

 and so we left the diagram

   What we take into account first is to locate

the section in which the person we are looking for is located,

then go to the section with the initial letter of the first surname,

then look for the full last name,

and since there are many people with that last name,

we look for the second last name and lastly the first name; And so we got to the phone.  

Therefore, in the flowchart, at last we add all the variables to reach the telephone, because this is the case in a directory; You add all the steps you did and as a result you get the phone number of the desired person.

You might be interested in
How could an online college utilize enterprise software? A. Develop new technical support jobs B. Improve course resources and n
Nata [24]

Answer:

The answer is "Choice B"

Explanation:

The enterprise applications is a software program that is used to meet the demands of planning instead of individual users. It also is referred to as business software applications that include schools, stakeholders involved, clubs, charity organizations as well as the states. Its develops processes for the course or viewing software used by online courses.

5 0
3 years ago
What is the only language a microprocessor can process directly but most programmers almost never write programs in this code? Q
elixir [45]
A microprocessor can directly process machine code but most programmers almost never write in it.
C. Machine code
7 0
3 years ago
Read 2 more answers
If classes C1 and C2 both implement an interface Cint, which has a method whichIsIt, and if C1 c = new C1( ); is performed at on
Assoli18 [71]

Answer:

FALSE

Explanation:

Because C1 and C2 implement the same interface, they both implement whichIsIt. The variable c is known as a polymorphic variable, meaning that it can change from being an C1 to a C2. So, the message c.whichIsIt( ); may invoke C1's whichIsIt or C2's whichIsIt. This can only be known at runtime.

5 0
3 years ago
Advanced persistent threat (APT) attackers want to ________. Select one: a. create awareness for their causes b. remain unnotice
Romashka [77]

Answer:

Option b (remain unnoticed so they can continue to steal data) is the right approach.

Explanation:

  • APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.
  • Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.

There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.

6 0
3 years ago
What if the result of conectivity testing is 100%Loss?Explain.​
kari74 [83]

Answer:

If you have a 100% packet loss, it means that all packets get lost between certain hops on your connection. Which, in turn, renders you unable to reach the destination server

8 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • divide the input array into thirds (rather than halves), recursively sort each third, and finally combine the results using a th
    15·1 answer
  • What role do you think mobile devices have played in shaping the world?
    13·1 answer
  • In general, use no more than _____ font types in a worksheet.
    11·1 answer
  • __________ has led to the belief that the Internet is "free".
    8·1 answer
  • Which of the following is an anxiety disorder
    5·2 answers
  • Give an example where traditional laws and modern media have created "grey areas".
    6·1 answer
  • What is the shortcut key to apply /remove the subscript effect?<br> Ctrl+=<br><br> Ctrl-+
    14·1 answer
  • How to use emojis on chromebook without on-screen keyboard
    14·1 answer
  • Software that converts program written in other language into machine language​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!