1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
3 years ago
6

Which uses flowcharts to communicate?

Computers and Technology
1 answer:
olga2289 [7]3 years ago
3 0

Answer: the answer is b

You might be interested in
What kind of networking is only for the use of people within the company
zaharov [31]
LAN = Local Area Network
6 0
3 years ago
Read 2 more answers
Users are unable to open files that are not relevant to their jobs. Users can open and view files but are unable to edit them. U
Paul [167]
They describe the adven
8 0
3 years ago
You need to install an operating system on a computer that will be sharing files for the company employees. You estimate there w
TiliK225 [7]

The operating system that is ideally suited for this machine that will be sharing files for the company employees with an estimated of as many as 15 users accessing these files at one time is Windows Server 2003 Standard Edition.

This operating system is best suited to handle the load of 15 concurrent users.

3 0
4 years ago
What is the time complexity of the addElement operation?
GREYUIT [131]

Answer:

The time complexity in the computer science is define as the computational complexity which basically describe the total amount of the time taken to execute the algorithm.

Time complexity is basically estimated by count the number of operation perform by the algorithm.

The time complexity of add-element operation is 2*log n or O(log n) and each time complexity is done by the log n times.

8 0
3 years ago
Can anybody answer this for me ?
VARVARA [1.3K]

how about this asset assessment, threat assessment, vulnerability assessment, risk step determines the value of each asset and prioritizes the asset based upon the would have grave consequences resulting in loss of life, serious injury, or mission How will exploiting or harming U.S. assets bring the adversaries closer to their company

hope me and sans helped :-)

4 0
4 years ago
Other questions:
  • How many nibbles are in 18 bytes??
    5·1 answer
  • Give two reasons why it is important to upgrade your browser when a new version becomes available.
    8·1 answer
  • A critical piece of equipment that provides power to systems even during a black out is called a(n) _______________.
    14·1 answer
  • Patrick Stafford's article argues that the growth of mobile phone usage "has given developers the ability to great robust and en
    7·1 answer
  • Thanks for asking me to ask a ques !!
    6·1 answer
  • Se Statements
    6·1 answer
  • Felicia has been having problems with her computer. Her documents won’t open, her computer is running slow, and programs automat
    7·1 answer
  • Why can a bank afford to pay an interest rate on a savings account?
    11·1 answer
  • Because of the abundance of water on planet Earth, hydrogen gas (H2) is a candidate in the search for a replacement for petroleu
    5·1 answer
  • True or false: If you have a 32-bit CPU architecture, it's recommended to use a 64-bit operating system.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!