1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
5

Write the algorithm and draw a flowchart to display the greatest number among any two different numbers....

Computers and Technology
1 answer:
joja [24]3 years ago
7 0

Answer:

Please check the attachment.

Explanation:

Please check the attachment.

Download docx
You might be interested in
What type of network access control uses Active Directory to scan a device to verify that it is in compliance?
Komok [63]

Answer:

Agentless NAC

Explanation:

An active directory is a kind of storage service that holds data of objects like user credentials, resource location etc, for permission and network access authentication.

Network access control is a form of computer network security that integrates security technology like antivirus, intrusion detection and prevention systems etc to system authorisation and authentication processes to control access to a network.

An agentless network access control uses the active directory to scan devices to confirm its compliance to security policies.

3 0
3 years ago
compared to other data structures, this dbms structure is more flexible and stores data as well as instructions to manipulate th
Nuetrik [128]

Object-oriented databases is more flexible and stores data as well as instructions to manipulate the data.

A system known as an object database uses object-oriented programming to represent data in the form of objects. Different from relational databases, which are table-oriented, are object-oriented databases.

The concept of object-oriented programming languages, which is currently popular, is the foundation of the object-oriented data model. Overloading, polymorphism, and inheritance Object-oriented programming fundamentals that have found use in data modelling include object-identity, encapsulation, and information hiding with methods to provide an interface to objects. The rich type system, which includes collection and structured types, is supported by the object-oriented data model as well.

In contrast to relational databases, which can only handle one type of data, object databases can handle multiple data types. Unlike conventional databases like hierarchical, network, or relational, object-oriented databases can handle a variety of data types, including text, numbers, images, voice, and video.

Also, Reusable code, realistic modelling, and increased dependability and flexibility are all provided by object-oriented databases.

To learn more about Object-oriented databases click here:

brainly.com/question/29441658

#SPJ4

7 0
1 year ago
3) How ash traditional technology and modern
Fynjy0 [20]

Answer:

While the developed world benefits from the modern explosion of technology, countries like Ethiopia continue to rely on their forefathers' methods for important daily tasks such as farming, cooling, and providing clean water. These activities are often physically challenging, time and energy intensive, and are often carried out by female family members in many such societies. Furthermore, they can damage the local ecology and climate, such as deforestation and soil erosion caused by the use of trees for firewood. Western technologies are often too complicated, expensive, unacceptable, and difficult to maintain in developing societies, so they are of little or no use in these situations.

4 0
3 years ago
What does this mean, i am so confused- Explain the importance of identifying the purpose/use for pre-production documents
irina1246 [14]

Answer: These are mostly used in interior design, fashion design, and advertising. they are often used to generate ideas for a client to meet their approval before making the final product. It can help in terms of planning because it could be used to create a design or a theme.

Explanation: yw

4 0
3 years ago
Which security scanner runs in a web browser and doesn't require that you install a product before scanning
balandron [24]

Answer:

It’s OSI. also your question cut off lol

4 0
3 years ago
Other questions:
  • What are five most important areas of the animal industry that involve science and technology?
    14·1 answer
  • What is the difference between an internal and an external method call? In what situation would only internal calls be needed?
    11·1 answer
  • You have a small company and want to keep your costs low, but it is important your employees share data. Which network would pro
    5·2 answers
  • What is Naptha used for?
    9·2 answers
  • Is Missouri a free state or a slave state​
    13·2 answers
  • Why is data processing done in computer?​
    14·1 answer
  • HELP ASAP, AND YES I KNOW, WRONG CATEGORY. SORRY!
    7·1 answer
  • What are the different steps while solving a problem using computer? explain​
    7·1 answer
  • Brody is concerned that he is going to exceed the quota set for his mailbox. Where should he go to access the Mailbe
    10·1 answer
  • A company organizes all of its client database in order of the amount of money that the account is worth. When a new account is
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!