1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
5

When writing an algorithm, the step after carrying out your plan is "sharing results."

Computers and Technology
2 answers:
pantera1 [17]3 years ago
8 0
Your answer would be true
9966 [12]3 years ago
3 0
This answer is true 100 percent
You might be interested in
“Union-compatible” means that the ____.
Mnenie [13.5K]

Answer:

(c) will be the correct option

Explanation:

Union-compatible : If there are two relations and both have are having same number of attributes then it called union compatibility the domain of similar attributes also must be same for union compatibility. Number of attributes means number of column

so from above discussion it is clear that option (C) will be correct option

3 0
4 years ago
Eric wants your help in remembering which of the following options corresponds to a dialog box that alerts the user to an error
nignag [31]

Answer:

MsgBox("User name is missing", 1 Or 16, "User Name Error")

Explanation:

6 0
4 years ago
What size hard disc is recommended for powerpoint writting
mixas84 [53]

Answer:

Depends on how many PowerPoint files you want to store and how long they are. I'd recommend at least a 256GB hard drive to store your OS and software and then leave space for PowerPoints.

5 0
3 years ago
Which of the following are some popular debugging techniques?
topjm [15]

Answer:

a fix any syntax bugs. I looked it up on the internet so you should be good good luck on your test

8 0
3 years ago
In peer to peer systems, the guarantees offered by conventional servers may be violated by:(a) physical damage to the host;(b) E
gayaneshka [121]

Answer:

Check the explanation

Explanation:

The two examples for each type of violation:

A) Power failure and Act of sabotage

B) Accidental deletion of file and Permission failure

C) Tampering of data, Denial of service attack

D) Failures of HDD (hard disk) and finding program bugs.

Note:

There is a difference in trusted behavior for pc's and servers are relevant because pea-to-peer system must be designed to cope with the looser interpretation of trust for pi s

4 0
4 years ago
Other questions:
  • What is an ISP?<br> in computer Networking
    11·2 answers
  • Suppose that you have been running an unknown sorting algorithm. Out of curiosity, you once stopped the algorithm when it was pa
    8·1 answer
  • Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
    7·1 answer
  • The ____ object can trigger a selectedindexchanged event when a selection is made
    5·1 answer
  • Can anyone give me $2 (Reddem code/Promo Code)​
    15·2 answers
  • Which category does this fall in identity theft​
    6·1 answer
  • While num_printed != num_stars: print('*') Sample output with input: 3 * * *
    15·1 answer
  • Your ISP connects to the core routers of the Internet via a O backbone O satellite O cable mode Ospine​
    9·1 answer
  • What is the difference between a threat and an attack?
    7·1 answer
  • What practice makes it virtually impossible to figure out the geographic location of a company?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!