1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
12

Write an algorithm for "How to Polish Your Shoes".

Computers and Technology
1 answer:
sammy [17]3 years ago
6 0

Answer:

Step 1- Start

Step 2- Take out your shoes

Step 3- Take out the shoe polish

Step 4- Put the shoe polish on your shoe

Step 5- Then polish your shoe

Step 6- Stop

hope this helps

You might be interested in
Jakob is stuck in the airport on a long layover while traveling for work. He sees two Wi-Fi’s he can log onto: one says Airport
Andrei [34K]
You should pick Free Airport Wifi bc its free
3 0
3 years ago
Read 2 more answers
A computer that delivers requested web pages to your computer or mobile device is a(n) _____.
yaroslaw [1]

Answer:

Web Server

A web server is server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web. A web server can, in general, contain one or more websites. A web server processes incoming network requests over HTTP and several other related protocols.

6 0
3 years ago
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
What is the default view when you first open a PowerPoint presentation
Mazyrski [523]

Question:

What is the default view when you first open a PowerPoint presentation

Answer:

Normal

8 0
4 years ago
You'll apply the concepts of Lesson 1 to create pseudocode and a flowchart for a modular program. The body mass index (BMI) is o
Kobotan [32]

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

  1. //Ask user for height & weight//
  2. "Enter weight (in pounds):"
  3. "Enter height (in inches"
  4. //Calculate the person's (BMI)//
  5. "BMI = weight * (703 / pow(height, 2));"
  6. //Display the person's (BMI)//

<h3>What is a flowchart?</h3>

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

<h3>What is a pseudocode?</h3>

A pseudocode can be defined as a description of the steps contained in an algorithm, especially through the use of a plain (natural) language.

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

  1. //Ask user for height & weight//
  2. "Enter weight (in pounds):"
  3. "Enter height (in inches"
  4. //Calculate the person's (BMI)//
  5. "BMI = weight * (703 / pow(height, 2));"
  6. //Display the person's (BMI)//

Read more on pseudocode here: brainly.com/question/13208346

#SPJ1

8 0
2 years ago
Other questions:
  • What is the difference between a switch's physical interface and the vlan interface?
    10·2 answers
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • In the Stop-and-Wait flow-control protocol, what best describes the sender’s (S) and receiver’s (R) respective window sizes?
    14·1 answer
  • The function known as "Comments" can be displayed during a presentation<br>O True<br>False​
    5·2 answers
  • Which of the following is NOT a benefit of safety and health programs?
    11·1 answer
  • All of the following are organization habits except:
    10·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • What will you see on the next line? &gt;&gt;&gt; int(6.5)
    12·2 answers
  • What is a spreadsheet​
    12·1 answer
  • It would be at least two decades before some of
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!