1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
3 years ago
9

Try writing pseudo code that describes how your device uses input data to perform the action that you want.

Computers and Technology
1 answer:
Zielflug [23.3K]3 years ago
4 0
// Input example:
var userInput = input("Action: ");
if(userInput == "run") {
// Run code
} else if(userInput == "stop") {
// Run code
} else {
// Run error code
}

// More-like-what-you-want example:
if(user.clickApp("Brainly")) {
// Open Brainly
} else if (user.clickApp("App")) {
// Open App
} else {
// Other if, else if, else statements
}
You might be interested in
Money money money money
elena-s [515]

Answer:

i love money <3

Explanation:

8 0
3 years ago
Read 2 more answers
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
Which statement regarding socializers is true?
allochka39001 [22]

Answer:

The answer is: they are comparable to suit of hearts

Explanation:

The answer is: they are comparable to suit of hearts

7 0
3 years ago
Read 2 more answers
Which is a benefit of owning a desktop computer instead of a laptop?
Setler79 [48]
B) a desktop is less likely to be stolen or damaged
4 0
3 years ago
Read 2 more answers
What is 1/10 of 2.0 in decimal form​
son4ous [18]

Answer to this is .2

5 0
3 years ago
Other questions:
  • Use a colon before a list and put one space after a colon. True False
    15·2 answers
  • Which should you use to find a saved file?
    15·2 answers
  • What is data anayltics
    5·1 answer
  • An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access t
    12·2 answers
  • _____ is used to temporarily hold small units of program instructions and data immediately before, during, and after execution b
    10·1 answer
  • Settings to control the amount of notifications is a
    10·2 answers
  • If E=mc2 then what does F equal?
    10·1 answer
  • What is the process of adding random characters at the beginning or end of a password to generate a completely different hash ca
    10·1 answer
  • Heres a meme<br><br>free pints as well, because why not.​
    10·2 answers
  • If you added the formula =SUM(B1:B5) to a spreadsheet, what would it do?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!