1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Savatey [412]
3 years ago
9

What is a flowchart​

Computers and Technology
1 answer:
serious [3.7K]3 years ago
4 0

a diagram of the sequence of movements or actions of people or things involved in a complex system or activity.

You might be interested in
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
HAIIIIIII ANYONE FEELING JOLLY OR SAD
Karo-lina-s [1.5K]

Answer:

Heyy I'm feeling sad and stressed. Wbu?

Explanation:

8 0
3 years ago
Read 2 more answers
What conversion factor should be used to convert from meters to Gigameters?
hodyreva [135]
Meters * 1,000,000,000 = gigameters
5 0
3 years ago
Will mark brainliest
Romashka [77]

Answer:

1 a

2 d

3 c

4 a

Explanation:

4 0
2 years ago
What are the components of a computer system
Snezhnost [94]

Answer:

The motherboard

Explanation:

3 0
2 years ago
Other questions:
  • Which tag pair contains the items in an ordered or unordered list?
    12·1 answer
  • When you add an rss feed to hootsuite publisher, posts from blogs and websites you designate will be?
    5·1 answer
  • Kyra needs help planning what images and text to use in her web page what technique can help her
    5·2 answers
  • A Network Attached Storage device is good for _____.
    11·2 answers
  • You specify the shape of an oval in a Java applet by defining the oval's:__________.
    5·1 answer
  • Select the correct answer.
    15·1 answer
  • An alteration threat violates information integrity. <br> a. True <br> b. False
    13·1 answer
  • What is out put in a computer
    14·2 answers
  • 23. ____________ is a slide that is used as the base design theme for other slides.​
    11·1 answer
  • Write programs in python to display “Valid Voter”. (condition : age of person should be
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!