1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phantasy [73]
2 years ago
9

How to write an algorithm to read and print a name? I want the steps please

Computers and Technology
1 answer:
bearhunter [10]2 years ago
8 0

Answer:

Step 1: Obtain a description of the problem. This step is much more difficult than it appears. ...

Step 2: Analyze the problem. ...

Step 3: Develop a high-level algorithm. ...

Step 4: Refine the algorithm by adding more detail. ...

Step 5: Review the algorithm.

Explanation:

You might be interested in
How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
pantera1 [17]

Explanation:

The second for loop does 1 of 4 iterations for every 1 of 5 iterations of the parent loop. meaning it is 4 x 5 which is 20.

8 0
2 years ago
A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high s
Montano1993 [528]

Answer: This is private IP address

Explanation:

192.168.25.10 is a private IP address and is reserved for use only within an organisation so it cannot be used to communicate with the outside world. So in order to have videoconferencing they have to share their public IP addresses.

4 0
3 years ago
What refers to the protocolâ s ability to ensure that data hasnâ t been modified in any way?
Tamiku [17]

Answer:

Option (b) Integrity

Explanation:

  • Data Integrity refers to the data which is not modified over the process, system.
  • Data Integrity here refers to which is not corrupted over the system in any way.
  • Throughout the life cycle of the process, system the data is intact and can be trusted for the future use.So, option (b) Integrity is the correct option.
  • Option (a) Confidentiality means the data that is kept secret, private but that doesn't mean it is not modified. So, option (a) confidentiality is wrong option.
  • Option (c) Authentication means the user is authenticated to use the data. It means the user has access to the data or not.So, option (c) is wrong option.
  • Option (d) Auditing means to examine, inspect a thing to find it fit for a purpose. Here, data auditing means verifying, inspecting,assessing the quality of data for a process.So, option (d) is wrong option.
3 0
3 years ago
Due to the difficult economic times, increased global competition, demand for customization, and increased consumer sophisticati
Lunna [17]

Answer:

b. False

Explanation:

Difficult economic times, increased global competition, demand for customization, and increased consumer sophistication does not direct companies to hire more employees and outsource middle managers.

Rather, companies tend to invest new technologies, information systems to satisfy the needs in global competition, consumer sophistication and customization.

Middle managers outsourced cannot deal these issues effectively, therefore they need to be company employees.  

In difficult economic times, companies does not want to hire extra employees because of increased cost.

8 0
3 years ago
What are the benefits of public access databases like ncbi? how does?
DaniilM [7]
<span>It has public-access databases,which makes the data available for masses. It develops software tools for analyzing genome data, and disseminates biomedical information. It also houses important resource for bio-informatics tools and services. It benefits researches with quantum of data available for their specific area of research.</span>
5 0
3 years ago
Other questions:
  • In Paint, which of the following are ways to use a picture that you have saved on your computer? (Select all that apply.)
    8·1 answer
  • Is a way of grading web pages by the number of other web pages that link to them?
    10·1 answer
  • The major difference between a calculator and a computer, when performing calculations, is that a
    10·1 answer
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    9·2 answers
  • What do libraries allow you to do in C++, and how do you incorporate libraries into a C++ program?
    10·1 answer
  • Consider the following program:
    6·1 answer
  • What describes a group of cells?<br> O crowd<br> Orange<br> O set<br> gangle
    7·2 answers
  • In PowerPoint _____ management is extremely important and you must keep track of what links, files, and programs are placed in w
    14·1 answer
  • The computer components that enables a computer to send and receive data, instructions or information from one or more computers
    13·1 answer
  • True of false that the memory of laptop is normally measured in kilobytes
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!