1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mr Goodwill [35]
4 years ago
9

The algorithm and flowchart

Computers and Technology
1 answer:
tatuchka [14]4 years ago
4 0

Answer:

Make a IPO chart it will be way easier!

Explanation:

You might be interested in
What does perseverance mean?
Dmitriy789 [7]
Ansewer is C a willingness to keep trying
7 0
3 years ago
Read 2 more answers
What is the difference between connecting link and missing link ?
JulijaS [17]
It's simple. Missing link is the connecting link which had been cut or extinct. The main example are extinct animal species.
8 0
3 years ago
EXERCISE 3
balandron [24]

Answer:

The BASIC program is as follows:

SUM = 0

FOR I = 1 TO 20

INPUT SCORES

SUM = SUM + SCORES

NEXT I

AVERAGE = SUM/20

PRINT AVERAGE

Explanation:

This initializes sum to 0

SUM = 0

This iterates through 20

FOR I = 1 TO 20

This reads each score

INPUT SCORES

This calculates the total scores

SUM = SUM + SCORES

NEXT I

This calculates the average

AVERAGE = SUM/20

This prints the calculated average

PRINT AVERAGE

5 0
3 years ago
What specific parameter will allow you to base a recursion policy on the subnet address of the clients?
Nookie1986 [14]

Answer:

Client subnet

Explanation:

Client subnet is a mechanism for recursive resolvers that helps to send partial client IP address information to authoritative DNS name servers. It is a group of IP subnets and it is identified by a name.

It is with the aid of client subnet that you base recursion policy on the subnet address of the clients.

6 0
3 years ago
Read 2 more answers
What has information technology made piracy possible?
Bond [772]
Well, more and more people are buying products and then uploading them online so that other people, who may not have the money or just don't want to buy them can download them for free. Of course, this is illegal, however it is a common practice all over the globe. Even if you are not downloading, but rather just watching a show on a website where you don't have to pay for it - it is still piracy.
5 0
4 years ago
Other questions:
  • Which file is used to determine which tty devices the root user is allowed to log in to?
    8·1 answer
  • What is the net stop command that will disconnect all share connections to the local PC?
    5·1 answer
  • Let L be any r.e. language. We know that there is an unrestricted grammar for L. Show that L can be generated by an unrestricted
    10·1 answer
  • Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
    14·1 answer
  • Which of the following best describes information techonolgy (IT)?
    6·1 answer
  • What order? (function templates) Define a generic function called CheckOrder() that checks if four items are in ascending, neith
    14·1 answer
  • Took some photos today for photography class what do you think??
    13·2 answers
  • Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she a
    12·2 answers
  • Why key logger are essential for computer system
    14·1 answer
  • All character entities end with _____ to signal the browser that everything in between is an entity representing a symbol.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!