1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vova2212 [387]
3 years ago
11

What are some characteristics of pseudocode? Check all that apply. Pseudocode is an informal way of expressing ideas and algorit

hms during the development process. Pseudocode uses simple and concise words and symbols to represent the different operations of the code. Pseudocode can be used to express both complex and simple processes. Pseudocode can be executed as a software program.
Computers and Technology
2 answers:
babunello [35]3 years ago
7 0

Answer:

all but the last one

maw [93]3 years ago
5 0

Answer:

all of them but the last. pseudo code cannot be executed.

You might be interested in
What elements are needed in a workstation domain policy regarding use of antivirus and malicious software prevention tools?
Reika [66]
The server should be able to block unauthorized access, a good firewall but still, enable those authorized to have an access. However, there should be security on vulnerable parts of the system that may lead to corruption and easy access to data thieves.
3 0
3 years ago
Define the word profit in business
LenaWriter [7]
The answer is A. good luck 
6 0
3 years ago
Read 2 more answers
How do I make a division sign with my Chromebook keyboard?
WITCHER [35]

Answer: you can't

Explanation: The best way to make one is to search for one then copy and paste

Hope this helps^^

7 0
3 years ago
One of the key properties of the ___________ approach is that a specific concept is represented by activity that is distributed
Olenka [21]

Answer:

connectionist

Explanation:

One of the key properties of a connectionist network is that a specific category is represented by activity that is distributed over many units in the network. This contrasts with semantic networks, in which specific categories are represented at individual nodes.

8 0
3 years ago
To lock down security settings on an individual system on a network, what would you use?
professor190 [17]

Answer:

The answer is "LSS(Local Security Settings)".

Explanation:

The LSS stands for Local Security Settings, it is a set of information about the security of a local computer. LSS allows a feature, that the information on the protection of a local computer is a local safety policy of a device.

  • This option is available on windows.
  • The local security policy information includes the domains, that trust login attempts to be authenticated.

 

8 0
4 years ago
Other questions:
  • Assume that to_the_power_of is a function that expects two integer parameters and returns the value of the first parameter raise
    13·1 answer
  • Unlike a virtual image, a real image
    7·1 answer
  • Networking Gadgets, Inc. currently employs eight people but plans to hire 10 more in the next four months. Users will work on mu
    10·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
    7·1 answer
  • Computer hardware without software is useless while computer software without hardware is meaningless. Discuss. Plz provide exam
    15·1 answer
  • PLEASE HELP!!! THIS IS WORTH A TEST GRADE!!!
    13·1 answer
  • Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
    11·1 answer
  • refers to a problem-solving approach that requires defining the scope of a system, dividing it into its components, and then ide
    12·1 answer
  • Most of the Desktop games contain a backdoor used to test and update the game.
    14·1 answer
  • Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!