1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
12

What are the three business writing formats

Computers and Technology
1 answer:
Tasya [4]3 years ago
8 0
They are Block, Modified Block, and Semi - Block Styles. Hope this Helps:)))
You might be interested in
The operation of an enable input on a multiplexer chip is.
Oxana [17]

Answer:

is used to activate the chip.

Explanation:

when enable is high the chip works (ACTIVE), when enable is low the chip does not work (MEMORY).

5 0
3 years ago
Which key doesn't relate to keyboard
igomit [66]

Answer:

Key to your heart

Explanation:

Chia Chia Chia Chia

8 0
3 years ago
Read 2 more answers
Recall the binary search algorithm.1. Using the algorithm/algorithmic environment, give pseudocode using a for loop.AnswerMy alg
faust18 [17]

Answer:

Following are the Pseudo Code to the given question:

Explanation:

Following are the pseudo-code by using the For loop:

Defines the A function (node, element)

The node is larger than 0.

if another value of the node equals its element

Loop Break

That element if node. value becomes lower than that

Node is node equivalent.

right

Using other nodes is node equivalent.

 left

Node Return

If the node is vacant

print the Tree is empty

Following are the pseudo-code by using the while loop:

Defines the function A(node,element)

While this node is not zero.

if the value of the node equals the element

Loop Break

The element if node. value is lower than

Node is node equivalent.

right

Using other nodes is equivalent to an a.left node

Node Return

If the node is vacant

print Tree is empty

following are the Pseudo-code for recursion:

Set the function A (node, key)

If no root is the same as the root or no root.

return the root.

If the root value is lower than that of the quest for key return (root. right, key)

Return your lookup (root.left,key)

 

5 0
3 years ago
Earthquakes with magnitudes between 1.0 and 2.9 on the Richter scale are
NeX [460]
They're not dangerous. However, they do cause mild tremors.
3 0
3 years ago
Flash drive DVD and hard drive are all examples of
oee [108]

Answer:

flash drive DVD and hard drive are all examples of storage device

8 0
3 years ago
Read 2 more answers
Other questions:
  • Required
    12·1 answer
  • Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front
    5·1 answer
  • In filmmaking, who is ultimately responsible for the creative process?
    15·1 answer
  • What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
    11·1 answer
  • What are common names for some primary discrete components used on circuit boards?
    13·1 answer
  • Which of the following is not considered a system component that can be found inside a computer? A-CPU B-RAM C-PCIe graphics ada
    6·1 answer
  • What are real online jobs any one of any age can get pays weekly by Pay<br> Pal
    8·1 answer
  • If your earning potential is higher than the cost of your higher education,<br> you will have a
    8·1 answer
  • A _____ shows how data moves through an information system but does not show program logic or processing steps.
    6·1 answer
  • Choose the answer that best completes the visual analogy.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!