1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
6

Computer science

Computers and Technology
1 answer:
Ksju [112]3 years ago
7 0
Pseudocode is a notation resembling a simplified programming language, used in program design


a text file is a computer file that only contains text and has no special formatting such as bold text, italic text, images, etc.
You might be interested in
Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Sele
FrozenT [24]

Answer:false

Explanation: why would you need a powerful it security system, if they already have authorized access?

6 0
2 years ago
In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
FrozenT [24]

Answer:

top-Down

Explanation:

4 0
3 years ago
The process of engineering design typically starts with what ?
klemol [59]

The process of engineering typically starts with brainstorming.
6 0
2 years ago
Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
vagabundo [1.1K]

Answer:

G m a i l

Explanation:

G m a i l by Google is the main commercial email provider to Android Phones. This is because it offers so many features that other email provider do not. One of this is the ability to backup your data, including contacts, messages, and others. This features along with other features makes Google g m a i l account the best option for Android users.

8 0
3 years ago
How can you tell the value of a purchase?
ZanzabumX [31]
Look at the price tag
find the item on ebay to see what other are selling it for


8 0
2 years ago
Other questions:
  • Write the execution steps if the input is a lion.
    11·1 answer
  • Sam has installed a new CPU in a client’s computer, but nothing happens when he pushes the power button on the case. The LED on
    14·1 answer
  • The version of Windows that first provided networking capabilities was _____.
    12·2 answers
  • Which encryption standard goes with the WPA2 protocol?<br> AES<br> DES<br> TKIP<br> WPS
    10·1 answer
  • Framing can create which of the following in a photograph? Mystery Saturation Aperture All of the above
    10·2 answers
  • What makes iron man different from other superheroes ? why is iron man the best superhero ??
    5·2 answers
  • What was the technology that defined each of the four generations of computers?
    12·1 answer
  • 3. When you right-click a linked spreadsheet object, what commands do you choose to activate the Excel features?
    7·2 answers
  • For C++ ONLY please,
    14·1 answer
  • 40 points for this question
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!