1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
3 years ago
9

Try writing pseudo code that describes how your device uses input data to perform the action that you want.

Computers and Technology
1 answer:
Zielflug [23.3K]3 years ago
4 0
// Input example:
var userInput = input("Action: ");
if(userInput == "run") {
// Run code
} else if(userInput == "stop") {
// Run code
} else {
// Run error code
}

// More-like-what-you-want example:
if(user.clickApp("Brainly")) {
// Open Brainly
} else if (user.clickApp("App")) {
// Open App
} else {
// Other if, else if, else statements
}
You might be interested in
In what year did alienware introduce alienfx lighting zones into their pc's?
ser-zykov [4K]
The answer to the question asked  above is 2006. 
<span>Alienware introduce alienfx lighting zones into their pc's on 2006.</span>

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
8 0
3 years ago
What name is used to denote a common field that exists between two tables, but is also the primary key for one of the tables??"
Diano4ka-milaya [45]

Answer:

b. foreign key

Explanation:

In the database world, a foreign key is a field on one table and a primary key for another table. The purpose of a foreign key is to provide linkages between two or more tables. Given two tables A and B, and making A the point of reference, a primary key is a field that is unique in A while a foreign key is unique in B.

On another hand, a composite primary key is a combination of two or more fields/columns on database table that can be used to uniquely identify each row in the table.

In the database lingua, what we have is a unique key not a distinct key, though the two words are similar in meaning.

A duplicate key is used when an information may be repeatedly entered on a table.

So the correct option is a foreign key.

4 0
3 years ago
The Internet Protocol Suite consists of the Internet Protocol and _____. a. Transmission Control Protocol b. File Transfer Proto
Lesechka [4]

The Internet Protocol Suite consists of the Internet Protocol and Transmission Control Protocol. Then the correct option is A.

<h3>What are Internet Protocol and Transmission Control Protocol?</h3>

Transmission Control Protocol/Internet Protocol (TCP/IP) is a set of communication protocols that are used to link network devices on the internet.

In a personal computer network, TCP/IP is often used as a wireless signal.

The IP suite's two major protocols have distinct roles. TCP specifies how apps might establish channels across a network.

More about the Internet Protocol and Transmission Control Protocol link is given below.

brainly.com/question/20813972

#SPJ1

6 0
2 years ago
Read 2 more answers
What command line utility can be used to repair the bcd on a windows installation?
Afina-wow [57]
You can use the following command Bootrec /rebuildbcd
8 0
3 years ago
You have an application that you would like to run on your Windows workstation every Monday at 3:00 p.m. Which tool would you us
NikAS [45]

Answer:

Task Scheduler

Explanation:

Task Scheduler allows you to automate tasks in Windows 10

7 0
3 years ago
Other questions:
  • 3) Write a program named Full_XmasTree using a nested for loop that will generate the exact output. This program MUST use (ONLY)
    6·1 answer
  • Can y’all help me with these questions ?
    5·1 answer
  • Cyberlaw consists of: a. only state statutes. b. only federal statutes. c. traditional legal principles that have changed becaus
    6·1 answer
  • Who needs to be involved when assembling business solutions that include hardware and software?
    11·2 answers
  • The algorithm ADDN implements N-bit fixed-width binary addition for non-negative integers and ignores overflows. For example, AD
    13·1 answer
  • Project using simple formulas
    15·1 answer
  • Given a collection of n nuts and a collection of n bolts, arranged in an increasing order of size, give an O(n) time algorithm t
    5·1 answer
  • Adobe reader is a type of​
    14·2 answers
  • Argue whether we can infer anything about a candidate's ability to work in a professional environment based on his or her resume
    5·1 answer
  • Compare mini and mainframe computer in terms of speed,memory and storage​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!