1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
7

The following outline is used to plan a program. What is the name for this type of plan?

Computers and Technology
2 answers:
vladimir1956 [14]3 years ago
7 0
Pseudocode is the answer
Elenna [48]3 years ago
7 0
The answer is D hope it helps
You might be interested in
_________ is the start up sequence a computer conducts.
Travka [436]

Answer:

Booting

Explanation:

Booting is the start up sequence a computer conducts when it is being turned on. The booting is done by the operating system. The booting process is usually started when a hardware on the computer is pressed or by a software command. For a windows computer, the BIOS is used to start the booting sequence. These boot sequence is called boot order or BIOS boot sequence.

6 0
4 years ago
- What are the different types of clients?
Nataly_w [17]

Answer: Different types of client are 1. Thick 2. Thin 3.Hybrid

Explanation:

A Thick client, also known as a rich client or fat client, is a client that performs the bulk of any data processing operations itself, and does not necessarily rely on the server.

A thin client is a minimal sort of client. Thin clients use the resources of the host computer.

A hybrid client is a mixture of the above two client models. Similar to a fat client, it processes locally, but relies on the server for storing persistent data.

7 0
4 years ago
Why do objects in the back seat move when the car turns
Korvikt [17]
Newton's law states that objects in rest tend to stay at rest. Since the car is moving one way, the objects are trying to stay at rest but it appears they're moving.
4 0
4 years ago
Write a program to compute the maximum and minimum value of three numbers:
nexus9112 [7]

Answer:

in javascript:

function compute(a, b, c){

let array = [a, b, c];

array.forEach((e,k) => {

if(e >= a && e >= b && e >= c){

console.log("maximum: " + e);

}  

if( e <= a && e <= b && e <= c){

console.log("minimum: " + e);

}

}

}

Explanation:

7 0
3 years ago
What do workspaces allow a company to do?
erica [24]

Answer:

The answer to this question is given below in the explanation section. The correct answer is A.

Explanation:

The correct answer to this question is:

They restrict access depending on job role.

because the company creates different workspaces for particular departments. Each department allows access to its employee to work and use the assigned resources. Other people from other departments can't use their computers due to security reasons.

However, the following options are not correct.

They connect a company's website with its internal wiki.

They allow a company to organize information. (information is maintained inside in the workspace)

They provide a platform for collaboration.

8 0
3 years ago
Other questions:
  • The ____ preceding a formula alerts excel that you are entering a formula or function and not text
    14·1 answer
  • Liquid water can change into a gas and become part of the air. When water is a gas, what is it called?
    7·1 answer
  • How does leadership play a role in IT management? How does leadership need to be aligned to the company’s goals for IT managemen
    9·1 answer
  • If your internet were to go out, what steps would you take to troubleshoot to restore your service?
    15·1 answer
  • What is the long tube on a microscope called​
    15·1 answer
  • What is the value of the variable result after these lines of code are executed? &gt;&gt;&gt; a = 5 &gt;&gt;&gt; b = 2 &gt;&gt;&
    8·2 answers
  • The post-closing trial balance shows the balances of only the ____ accounts at the end of the period.
    12·1 answer
  • MSWord is a popular___________ program.​
    7·2 answers
  • Why do you want to work from our company?​
    9·2 answers
  • which one of the following would not normally be found in an organization's information security policy?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!