1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
15

Which shape is used for input or output?

Computers and Technology
1 answer:
Verizon [17]3 years ago
6 0

Answer:

Parallelogram

Parallelogram A parallelogram is used to read data (input) or to print data (output). Rectangle A rectangle is used to show the processing that takes place in the flowchart. Diamond A diamond with two branches is used to show the decision making step in a flowchart.

You might be interested in
Could it be there will be nothing like lost forever documents with programs like backupdocs.com?
katen-ka-za [31]

Answer:

Yes

Explanation:

The programs like backupdocs.com help us in storing the lost forever documents like driving license, ration card, social security number, etc., and in case they are lost you need not worry as the backup is there on the backupdocs.com. You can hence, get your lost forever documents from the backupdocs.com in case you have lost them. Hence, the fact put forward by the above question is certainly true. And backupdocs.com is a real advantage for us hence.

4 0
3 years ago
Programming terms!!Please need help!!!
Alexeev081 [22]
1 algorithm
2 sequential
3 selection
4 loop
5 boolean
6 variables
7 expression
8 concatenation
9 operator
10 function
11 argument
12 event
13 event handler
14 class
15 object
16 instance
17 properties
18 methods
19 parameters
8 0
3 years ago
match the type of secondary storage devices to their examples. CD, hard disk, flash memory. answer choices: magnetic storage dev
alisha [4.7K]
Hi pupil here's your answer ::


➡➡➡➡➡➡➡➡➡➡➡➡➡

Column A Column B

1》CD = Optical Storage Devices

2》Hard Disk = Magnetic Storage Device

3》Flash Memory = Solid State Storage


⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅


Hope this helps. . . . . . .
3 0
3 years ago
Question 1 of 40
Novay_Z [31]

Answer:

D. Federal Work-Study

Explanation:

8 0
4 years ago
Create an interface MessageDecoder that has a single abstract method decode(cipherText), where cipherText is the message to be d
Nastasia [14]

Answer:

Check the explanation

Explanation:

MessageEncoder. java

public interface MessageEncoder

{

  //single abstract method encode(plainText) where plainText is the message to be encoded.

  public String encode(String plainText);

}//end interface

SubstitutionCipher. java

import java.util.Scanner;

public class SubstitutionCipher implements MessageEncoder, MessageDecoder

{

   /**

     The constructor should have 1 parameter called shift

   */

   private int shift;

 

   /**

     Non-default constructor with one parameter    

   */

   public SubstitutionCipher(int numberSpaces)

   {

       shift = numberSpaces;

   }//end non default constructor

 

   /**

     Define the method encode so that each letter is shifted by the value in shift

   */

   public String encode(String plainText)

   {

       String cipherText = "";

       for(int i = 0; i < plainText. length(); i++)

       {

           Character encodeLetter = plainText.charAt(i);

           cipherText = cipherText + shift1Character(encodeLetter);

       }//end for loop

       return cipherText;

   }//end encode method

 

   /**

     Define the method decode so that each letter is shifted by minus the value in shift

   */

   public String decode(String cipherText)

   {

       String plainText = "";

       for(int i = 0; i < cipherText. length(); i++)

       {

           Character decodeLetter = cipherText.charAt(i);

           plainText = plainText + shift1CharacterBack(decodeLetter);

       }//end for loop

       return plainText;

   }//end encode method

   /**

     Hint: You may wish to define a private method that shifts a single character

   */

   private Character shift1Character(Character oneLetter)

   {

       return (char)(oneLetter + shift);

   }//end method

 

   /**

     Hint: You may wish to define a private method that shifts a single character

           back to its original position

   */

   private Character shift1CharacterBack(Character oneLetter)

   {

       return (char)(oneLetter - shift);

   }//end method

 

////////////////////////////////////////////////////////////////////////////////////////////////////////

   public static void main(String[] args)

   {

       Scanner keyboard = new Scanner(System.in);

       SubstitutionCipher shift3Places = new SubstitutionCipher(3);

       System.out.println("Substituation method using caesar shift: \n");

       String plainText = "I think I am finally back on track\n";

       System.out.println("Plain text to be encoded: " + plainText);

     

       String cipher = shift3Places.encode(plainText);

       System.out.println("Cipher text after encoding: " + cipher);

     

       SubstitutionCipher shiftMinus3 = new SubstitutionCipher(-3);

       System.out.println("\n\nTime to decode the cipher now.\n");

     

       String decoded = shiftMinus3. encode(cipher);

       System.out.println("Decoded text after removing cipher: " + decoded);

   

       ////////////////////////////////////////////////////////////////////////////System.out.println("Testing the decode method.");

       ////////////////////////////////////////////////////////////////////////////decoded = shift3Places. decode(cipher);

       ////////////////////////////////////////////////////////////////////////////System.out.println("Text after decoding: " + decoded);

   }//end main

}//end class

MessageDecoder. java

public interface MessageDecoder

{

  //single abstract method decode(cipherText) where cipherText is the message to be decoded.

  public String decode(String cipherText);

}//end interface

3 0
3 years ago
Other questions:
  • The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
    15·2 answers
  • Which type of address is used in a packet to address the packet to a single host??
    12·1 answer
  • Who was the inventor of the iPhone?
    13·2 answers
  • What kind of software is Microsoft Outlook??
    15·2 answers
  • Explain the procedure you will undertake to create a new partition​
    11·1 answer
  • What are the values of a[k] and a[k+1] after code corresponding to the following pseudocode runs?
    9·2 answers
  • Which element adds a “page turn” effect to the slides in a presentation?
    13·2 answers
  • Freee poiiiiintttttssss​
    14·2 answers
  • What information is contained in the title bar
    13·1 answer
  • What is an example of an intelligent automation solution that makes use of artificial intelligence?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!