1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LekaFEV [45]
3 years ago
9

Which is true regarding pseudocode?

Computers and Technology
2 answers:
drek231 [11]3 years ago
4 0

Answer:

It uses simple words and symbols to communicate the design of a program.

Explanation:

Virty [35]3 years ago
4 0

Answer:

The answer is A it uses simple words and symbols to communicate the design of a program.

Explanation:

Science Stuff

You might be interested in
Bottom-up integration testing has as it's major advantage(s) that
irakobra [83]
It's C) no stubs need to be written
8 0
3 years ago
Where would the information needed to start a computer be stored?
ASHA 777 [7]

Answer:

BIOS software is stored on a non-volatile ROM chip on the motherboard. … In modern computer systems, the BIOS contents are stored on a flash memory chip so that the contents can be rewritten without removing the chip from the motherboard.

Explanation:

8 0
3 years ago
What might happen if Python code is not in the correct order? The computer will fix the steps automatically. The computer will f
Vesna [10]

Answer:

The computer will follow the steps, but the program might not work.

Explanation:

4 0
4 years ago
Read 2 more answers
Which among the following is a fraudulent or deceptive act designed to trick individuals into spending time or money for little
ivanzaharov [21]

Answer:

A. Internet scams.

Explanation:

Internet scams is a fraudulent or deceptive act designed to trick individuals into spending time or money for little or no return through the use of a cloud service or the internet. Some examples of an internet scam are phishing scams, email spams, credit card scam, etc. It is simply centred around the provision of false information or misrepresentation of another party for the sole purpose of theft.

Hence, an internet scam is an illegal means of obtaining things from people and such is a cyber crime that is punishable by law.

6 0
3 years ago
Elisa and Josh need to access General Help. Elisa will press the F1 key. Josh will click on ? in the upper-right corner of the W
Lostsunrise [7]
The answer is A. Only Elisa.
5 0
3 years ago
Other questions:
  • Type the correct answer in the box spell all words correctly
    8·1 answer
  • Determine if x(t) is periodic and determine the fundamental period.
    15·1 answer
  • Replace any alphabetic character with '_' in 2-character string passCode. Ex: If passCode is "9a", output is: 9_
    6·1 answer
  • Which of the following is a function of the slip yoke used on a driveshaft?
    14·1 answer
  • When sending an email to work colleagues you should NOT use ____________.
    8·1 answer
  • Katla is a project manager. One of the programmers on her team comes to her and says that he permanently deleted some code mista
    5·1 answer
  • ITING THE ANSWER
    9·1 answer
  • PLEASE HELP ME ASAP ITS IMPORTANT
    8·2 answers
  • Order the steps for creating an automatic reply in Outlook.
    13·2 answers
  • To enhance the readability of your document, select a layout that aligns text ________.
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!