1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
9

Which is true regarding pseudocode?

Computers and Technology
2 answers:
drek231 [11]3 years ago
4 0

Answer:

It uses simple words and symbols to communicate the design of a program.

Explanation:

Virty [35]3 years ago
4 0

Answer:

The answer is A it uses simple words and symbols to communicate the design of a program.

Explanation:

Science Stuff

You might be interested in
When the writer of a letter sends a copy to a third party without the knowledge of the person receiving the original letter, it
ahrayia [7]

The answer here is Blind carbon copy (bcc).

The original recipients of the letter are unable to see (blind) who else receives a copy if those parties are on the bcc list.

3 0
3 years ago
Can you right the C++ of this algorithm? Inizio = Start, Fine= End. THANK YOU SO MUCH!!
posledela
<span>#include <iostream> using namespace std; bool bears(int n); int main(){ int number; do{ cout<<"enter the amount of bears (press 0 to stop the program): "; cin>>number; if (bears(number)){ cout<<"you have reached the goal!"<<endl; } else{ cout<<"sorry, you have not reached the goal."<<endl; } }while(number != 0); } bool bears(int n){ if (n < 42){ return false; } else if (n == 42){ return true; } else{ if (n % 5 == 0){ return bears(n - 42); } else if(n % 2 == 0){ return bears(n / 2); } else if(n % 4 == 0|| n % 3 == 0) { int one; int two; one=n%10; two=(n%100)/10; return bears(n - one * two); } } <span>}</span></span>
4 0
3 years ago
How does Aristotle’s Art of Rhetoric impact the effectiveness of advertisements?
eimsori [14]

Aristotle's Rhetoric has had an enormous influence on the development of the art of rhetoric. Not only authors writing in the peripatetic tradition, but also the famous Roman teachers of rhetoric, such as Cicero and Quintilian, frequently used elements stemming from the Aristotelian doctrine. Nevertheless, these authors were interested neither in an authentic interpretation of the Aristotelian works nor in the philosophical sources and backgrounds of the vocabulary that Aristotle had introduced to rhetorical theory. Thus, for two millennia the interpretation of Aristotelian rhetoric has become a matter of the history of rhetoric, not of philosophy. In the most influential manuscripts and editions, Aristotle's Rhetoric was surrounded by rhetorical works and even written speeches of other Greek and Latin authors, and was seldom interpreted in the context of the whole Corpus Aristotelicum. It was not until the last few decades that the philosophically salient features of the Aristotelian rhetoric were rediscovered: in construing a general theory of the persuasive, Aristotle applies numerous concepts and arguments that are also treated in his logical, ethical, and psychological writings. His theory of rhetorical arguments, for example, is only one further application of his general doctrine of the sullogismos, which also forms the basis of dialectic, logic, and his theory of demonstration. Another example is the concept of emotions: though emotions are one of the most important topics in the Aristotelian ethics, he nowhere offers such an illuminating account of single emotions as in the Rhetoric. Finally, it is the Rhetoric, too, that informs us about the cognitive features of language and style.

4 0
3 years ago
Which network device regenerates the data signal without segmenting the network? modem?
Yanka [14]
Hub(s) is the answer
6 0
3 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
nata0808 [166]

Answer:the correct answer is the c)

An insider

Explanation:

Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.

8 0
3 years ago
Other questions:
  • • what command-line utility can you use to assign the correct dns server ip address
    15·1 answer
  • Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s)
    14·1 answer
  • The purpose of the trusted platform module is:
    15·2 answers
  • 1. What does it mean to say that a country’s land area is positively correlated with its population?
    12·2 answers
  • What is a spec sheet?
    9·1 answer
  • What sends massive amounts of email to a specific person or system that can cause that user's server to stop functioning? mail b
    6·1 answer
  • Create a SavingsAccount class. Use a static data member annualInterestRate to store the annual interest rate for each of the sav
    10·1 answer
  • Anyone know a way to trade in a Xbox with a Ps4?
    10·2 answers
  • The average American has 10 devices, ask for users average number of devices. Any number between 7 and 12 will print “you have a
    13·1 answer
  • 25 points
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!