1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
12

Write an algorithm for "How to Polish Your Shoes".

Computers and Technology
1 answer:
sammy [17]3 years ago
6 0

Answer:

Step 1- Start

Step 2- Take out your shoes

Step 3- Take out the shoe polish

Step 4- Put the shoe polish on your shoe

Step 5- Then polish your shoe

Step 6- Stop

hope this helps

You might be interested in
Which command is used to format a partition on a hard disk drive with the ext4 filesystem?
FinnZ [79.3K]
Mkfs -t ext4 /dev/file
5 0
3 years ago
To remove white space, double-click this icon.
sweet [91]
Follow these steps:<span>Click the Microsoft Office Button, and then click Word Options.
In the left pane, click Customize.In the Choose commands from list, click All Commands.<span>
Click White Space Between Pages, click Add, and then click OK.
The White Space Between Pages option will appear on the Quick Access Toolbar.</span></span>(google)
I hope I answered your question!
4 0
3 years ago
Please help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Pie
I'd say PCIe x1... in terms of preformance
8 0
3 years ago
Read 2 more answers
If a device is determined to have an out-of-date virus signature file, then Network Access Control (NAC) can redirect that devic
GalinKa [24]

Answer:

C. Address Resolution Protocol (ARP) poisoning.

Explanation:

An antivirus signature file is a program written to describe and remedy a group of identified malware attacks, to prevent future attacks from the described malicious softwares. It is constantly updated to identify more malicious softwares.

A network access protocol (NAC) is used to implement access control on a network, collaborating with other protocols like ARP and unifying antiviruses, intrusion detection and vulnerability assessment.

When the virus signature file is out of date, the NAC allows a new malware, the antivirus can not identify, to access the network through ARP poisoning.

4 0
3 years ago
On your Windows server, you're planning to install a new database application that uses an enormous amount of disk space. You ne
hoa [83]

Answer:

ReFS format and Storage Spaces.

Explanation:

ReFS(Resilient File System)format was introduced in 2012 and it was the replacement for NTFS(NT File System).It was introduced as a part of the Windows Server.ReFS supports maximum value of 1 yottabyte (1 one million Terabytes). It also supports auto-correct form disk errors and data corruption.You need a storage space to store the data hence  we need storage space also.

4 0
3 years ago
Other questions:
  • A Hierarchy Custom Setting stores a specific URL for each profile in Salesforce. Which statement can a developer use to retrieve
    5·1 answer
  • What are two benefits of consumer programs
    13·1 answer
  • Which of the following are true statements about collisions in hashing? Linear probing can cause secondary collisions. Higher sp
    6·1 answer
  • What type of organizational structure would you want to use for this company (by function, by process, by product, and so on)? E
    11·1 answer
  • How does form get its power natural gas
    14·1 answer
  • Create the SQL statements for displaying the results for each of the following scenarios in the Academic Database. Save these st
    13·1 answer
  • What is software infrastructure?
    15·1 answer
  • What is a typical use for a MAN?
    13·1 answer
  • 1. Sunday Times wants an analysis of the demographic characteristics of its readers. The
    8·1 answer
  • Memorex Disks sells computer disk drives with right-of-return privileges. Returns are material and reasonably predictable. Memor
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!