1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mashutka [201]
3 years ago
8

Write a algorithm to attend birthday party​

Computers and Technology
2 answers:
kolezko [41]3 years ago
8 0

Answer:

2     No

5 14    Yes

Explanation:

topjm [15]3 years ago
6 0
Hdbdhfhfbfbfbfbfbfbfbfbfbfbfbf
You might be interested in
Which best describes the condition under which the Unicode output is the same as plain text?
Nostrana [21]

Answer:

When the text contain the ASCII code (Which contains the character) is the correct answer of the above question.

Explanation:

ASCII is used for the Unicode for the computer system. The full form of this is the American standard code of information interchange.  It is a code that is used by the computer system for their personal use. It is because no one can hack the information from the system. If anyone can do so then they can get that text which has no mean.

The above question asked about the condition in which Unicode output is the same from plain text. So the answer is ASCII code because the ASCII code and the Unicode are the same. The only difference between them is the representation of bits.

3 0
3 years ago
While creating a sketch, what helps you identify positive and negative space?
Eduardwww [97]

Answer:      positive = plus sign and negativie = subraction sign

Explanation:

7 0
3 years ago
How is energy expended in active transport​
professor190 [17]

Here's the biology explanation:

Most of the energy expended by a cell in active transport is used to pump ions out of the cell across the plasma membrane.

7 0
4 years ago
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
4 years ago
Read 2 more answers
Which statement best describes top-down programming design?
MariettaO [177]

B is the answer (i think)

5 0
3 years ago
Other questions:
  • What does Josh Silverman name as the most important aspect of managing finances?
    10·2 answers
  • Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the s
    14·1 answer
  • Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
    6·1 answer
  • A company that manufactures machine parts orders a new system that makes products at ten times the speed of the earlier machine.
    6·2 answers
  • What are Boolean​ connectors? A. sites that connect you to more information on your topic B. databases that link your topic to a
    10·1 answer
  • Midday is a good time to take a portrait outside.<br> true or false?
    8·1 answer
  • Meryl works in the audio-video department
    10·2 answers
  • What are the steps to view two different versions of the same document at once? 1. Go to the File tab on the ribbon. 2. Select T
    6·1 answer
  • Write about how this item was important to you.
    9·1 answer
  • the graph at left in the tctct, c-plane models the global wind power capacity, ccc, in gigawatts, ttt years since 199619961996.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!