1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
7

The following outline is used to plan a program. What is the name for this type of plan?

Computers and Technology
2 answers:
vladimir1956 [14]3 years ago
7 0
Pseudocode is the answer
Elenna [48]3 years ago
7 0
The answer is D hope it helps
You might be interested in
How has the widespread shift to remote work caused businesses to reconsider their use of Extended Reality (XR)?.
romanna [79]

The widespread shift to remote work has caused businesses to reconsider their use of Extended Reality (XR) by inspiring them to re-imagine employee experiences and engagement with XR capabilities.

<h3>What is Extended Reality?</h3>

Extended Reality (XR) refers to an umbrella terminology that is used to describe all real and virtual physical environments (realities) and human-machine interactions through the use of various computer technologies and wearables.

In Business management, Extended Reality (XR) are typically used by employers of labor to boost workforce performance, engagement, retention and deliver better experiences to both their employees and customers (clients).

In terms of widespread shift to remote work, businesses have reconsidered their use of Extended Reality (XR) by re-imagining employee experiences and engagement with XR capabilities, so as to boost workforce performance, engagement, and retention.

Read more on Extended Reality here: brainly.com/question/26479902

4 0
3 years ago
Acceptance tests are normally conducted by the
dedylja [7]
The answer is D. System engineers
7 0
4 years ago
Read 2 more answers
Write a program that passes an unspecified number of integers from command line and displays their total. Sample Run 1 command&g
Lana71 [14]

Using the computational language in JAVA it is possible to write a code that at least passes an unspecified number of integers

<h3>Writing code in JAVA</h3>

<em>class Exercise07_21</em>

<em>{</em>

<em>public static void main(String args[])</em>

<em>{</em>

<em>int sum=0;</em>

<em>for(int i=0;i<args.length;i++)</em>

<em>sum=sum+Integer.parseInt(args[i]);//converting string to integer and then adding it with sum variable and storing back in sum</em>

<em>System.out.println("The total is "+sum);//printing the sum</em>

<em>}</em>

<em>}</em>

See more about JAVA code at brainly.com/question/12975450

#SPJ1

5 0
2 years ago
Adios brainly, wont be posting that much take my points away i d c
mrs_skeptik [129]
Omg I would die to have your points because when I get on people call me a noob because I just got the app like 3 days ago and every time I answer a question some says noob like dang I just started
5 0
3 years ago
Read 2 more answers
It is said that Wifi repeater is not good as a rumor
stealth61 [152]
True your welcome bue
4 0
3 years ago
Other questions:
  • Any method of determining whether an event or object is older or younger than others
    13·2 answers
  • I - For any two points on the Internet, there exists only one path between the two points II - Routing on the Internet is fault
    12·1 answer
  • What does Tristan need to do to add a row at the<br> bottom of the table shown?
    6·1 answer
  • You can sort a large array of integers that are in the range 1 to 100 by using an array count of 100 items to count the number o
    9·1 answer
  • You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to
    13·1 answer
  • A constructor must have a return statement.<br><br> True<br><br> False
    14·2 answers
  • 21. If you want to improve the performance of your PC, you need to upgrade the
    7·1 answer
  • 2.
    9·1 answer
  • please help me out i’ll give you brainlist
    14·1 answer
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!