1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
2 years ago
8

Design a hierarchy c hart or flowchart for a program that calculates the current balance in a savin gs account. The program must

ask the user for:
Computers and Technology
1 answer:
VashaNatasha [74]2 years ago
8 0

Answer:yxyyxysje

Explanation:

You might be interested in
Write the contributions of dr herman hollerith​
Ad libitum [116K]

He invented the tabulating machine. In 1890 U.S

5 0
3 years ago
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
2 years ago
For which firewall feature should you create forward trust and forward untrust certificates?
guajiro [1.7K]

Answer:Jun 19, 2019 - Additionally, set up a forward untrust certificate for the firewall to ... After setting up the forward trust and forward untrust certificates required for SSL Forward Proxy ... If you do not install the forward trust certificate on client systems, ... Create a Decryption Policy Rule to define traffic for the firewall to decrypt.

WELCOME

8 0
3 years ago
Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purc
luda_lava [24]

Answer:

i dont know the answer

Explanation:

3 0
2 years ago
Transforming a message into an understandable sign and symbol system is _________.
Nataly_w [17]

Answer:

The correct answer to the following question will be "Encoding".

Explanation:

Encoding is the method of bringing into a standardized format a series of characters (words, figures, punctuation, and certain signs or symbols) for effective communication or storage.

The four main encoding styles are as follows:

  • Visual
  • Acoustic
  • Elaborative
  • Semantic.

Encoding aims is to translate data so that a particular system can properly interpret it, e.g. binary data to be sent via email, or displaying special characters on a website page. The aim is not to keep the information hidden but also to ensure it could be accessed properly.

Therefore, Encoding is the right answer.

4 0
3 years ago
Other questions:
  • Write a program that takes two ints as input from the keyboard, representing the number of hits and the number of at bats for a
    10·1 answer
  • You must have an active ____ to test external links.
    5·1 answer
  • Recursion is a natural use for a _____ (stack or queue)
    13·1 answer
  • Program documentation _____.
    8·1 answer
  • What is the difference between the web and the internet?
    14·1 answer
  • Legal functions are the most important area of IG impact. Under the FRCP amendments, corporations must proactively manage the e-
    9·1 answer
  • When discussing the business requirements of a WLAN design, what is the first question that should be posed
    15·1 answer
  • If an electric circuit has 30ohms and 10amps. How many volts the battery voltmeter should read?
    10·1 answer
  • Consider the following statement: String myMiddleInitial = “h”;
    15·1 answer
  • There is overlap in the subjects of study in the different information technology disciplines. true or false
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!