1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
7

The following outline is used to plan a program. What is the name for this type of plan?

Computers and Technology
2 answers:
vladimir1956 [14]3 years ago
7 0
Pseudocode is the answer
Elenna [48]3 years ago
7 0
The answer is D hope it helps
You might be interested in
What does ‘‘negotiation’’ mean when discussing network protocols? give an example?
rewona [7]
Some protocols have multiple algorithms to choose from for e.g., cryptographic purposes. During connection set up, client and server negotiate which one they'll use.

One example is the set up of a TLS connection. During the handshake, the client shares a list of its supported ciphers (the 'ciphersuites'). The server responds by indicating the best one that both sides support.

4 0
2 years ago
In 2009 to 2010, how many social network users were reported as being victims of online abuse?
Dafna1 [17]
The answer is B because being victims of online abuse is not important
7 0
3 years ago
Read 2 more answers
Give any 3 examples of mainframe computers .
Eddi Din [679]
3 Examples of mainframe computers
z900
System z9
System z10
5 0
3 years ago
. In Laissez-faire Styleof Group Leadership, Members of the group are not given help inactivity plans by the leader only when it
Trava [24]

Answer:

The statement is false.

Explanation:

In Laissez-faire Style of group leadership, the members of the group are given all the responsibilities by the leader or the manager. The members of the group take all the decisions and control the working of the group. The manager provides with some guidance or support only when it is asked by the group members.

4 0
2 years ago
What is a deny all catch all
a_sh-v [17]

Answer: The default catch-all rules at the end of  are: block in log quick all label "Default block all just to be sure." block out log quick all label .

Explanation:

7 0
3 years ago
Other questions:
  • The highly advanced decision support feature integrated within an electronic information system would support which activity?
    9·1 answer
  • Can I change my brainly username?
    9·2 answers
  • A web client is sending a request for a webpage to a web server. from the perspective of the client, what is the correct order o
    14·1 answer
  • An air-conditioning system's automatic controller might directly control the
    7·2 answers
  • What kind of energy transformation occurs in a gasoline-powered car?
    14·1 answer
  • The methods in a subclass can use all of the data fields and methods that belong to its parent, with one exception: ____ members
    11·1 answer
  • What Word features allow you to copy multiple paragraph formatting syles
    5·1 answer
  • Elizabeth works for a local restaurant at the end of her shift she read she’s required to write in the time that she arrived in
    14·1 answer
  • What are the two basic classes of active directory objects?
    14·1 answer
  • Design and implement an application that reads a string from the user then determines and prints how many of eachlowercase vowel
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!