1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
2 years ago
6

What happens if a sequence is out of order?

Computers and Technology
2 answers:
andre [41]2 years ago
6 0

Answer:

If you are trying to put the events in order and they are out of order you will probaly get the question wrong so make sure the events are in order.

Explanation:

BARSIC [14]2 years ago
4 0

Answer: a, The program may not work correctly.

Explanation: Because I do coding, and learned this already.

You might be interested in
Consider the following line of code: price= input(Please enter the price: ") What would be the next line in your code that will
hodyreva [135]

Answer:

price float(price)

Explanation:

There are four basic type of data type use in the programming to declare the

variable.

1. int:  it is used for integer values.

2. float:  it is used for decimal values.

3. char:  it is used for character values

4. Boolean: it is used for true or false.

in the question, the one option contain the data type float (price float(price)). So, it store the value in decimal.

price int(price):  it store the value in integer.

price decimal(price):  it is wrong declaration of variable. their is no data type in the programming which name is decimal.

price price(decimal):  it is wrong declaration of variable. their is no data type in the programming which name is price.

6 0
3 years ago
The ____ is the ranking executive on-site when the crisis or emergency arises, who is authorized to initiate the CM plan.
aleksklad [387]

The answer is the Executive-in charge

The concept of an Executive-in charge came from the military’s chain of command. A chain of command ranges from a supervisor to the top executive of the organization. When a crisis arises, it is possible that one or more of the senior top managers may not be available for consultations because of the travel-intensive positions.






7 0
3 years ago
Read 2 more answers
What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that m
LuckyWell [14K]

Answer:

In several organizations, the operating system (OS) functions at the core of the personal computers in use and the servers. The OS ought to be secure from external threats to its stored data and other resources.

Explanation:

In this regard, Intrusion detection systems play a critical role in protecting the sensitive data, along with software firewalls. Hardware firewalls protect the hardware elements in the network (such as storage drivers etc), the IDS and as well as the IPS.

4 0
3 years ago
Is a "Stock Transfer Clerk" in charge of putting the objects on the shelfs?
ella [17]
They are in charge of keeping records, documenting information of ownership and processing requests.
5 0
3 years ago
A typical day in programming and software development would involve
slamgirl [31]

Answer:

Option D. writing code for a software program

Explanation:

One important task in programming and software development is to write code for a software program. Writing code is an activity that involves writing commands that can be understood by computer to perform certain task. There are many programming languages that can be chosen by a programmer to write their code. The choice of language is dependent on the purpose of the program itself and it can be also the self-preference or computing background of that programmer.

5 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Write the name of the tab, command group, and icon that is used to sort information in a Word document.
    12·2 answers
  • Only class b and class c networks can be subnetted true or false
    6·1 answer
  • g Write a function called price_of_rocks. It has no parameters. In a while loop, get a rock type and a weight from the user. Kee
    13·1 answer
  • Disk requests come in to the disk driver for cylinders 10, 22, 20, 2, 40, 6, and 38, in that order. A seek takes 6 msec per cyli
    6·1 answer
  • Anyone understand coding? Please Help! Thank you! :)
    8·1 answer
  • Select the correct answer
    5·2 answers
  • Speech about society being normal
    12·1 answer
  • _________________ uses soap or detergent to physically remove germs, dirt, and impurities from surfaces or objects.
    13·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!