1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
15

Pls answer i need to turn it in today!!

Computers and Technology
1 answer:
Marianna [84]3 years ago
5 0

Answer:

See Explanation

Explanation:

How decisions are represented?

In flowcharts, decisions are represented using diamond shapes (see attachment)

Decisions could be conditional statement or repetition operations which may have the form of loops or iterations.

Either of theses are represented using the diamond shapes.

Take for instance:

To check if a is greater than b... Simply write if a > b i the diamond box

Command used for most decisions

Most decisions are conditional statements; hence, the if command is often used for decisions.

You might be interested in
How should font appear in a slide presentation compared to the font in a document
saul85 [17]

Answer:

larger in a presentation, smaller on a document.

Explanation:

this makes it easier to tell which is which.

3 0
3 years ago
The ________ model allows the owner of a resource to manage who can or cannot access the item. Owners maintain this access throu
blagie [28]

Answer:

Discretionary Access Control model

Explanation:

Discretionary Access Control (DAC) gives owners of a resource full control of objects/items they have created or been given access to, this also includes sharing the objects/items with other subjects. These owners have control over their data and maintain access through ACLs. The access-control list (ACL), is a list of permissions attached to an object in a computer file system.

The Owners can decide to grant other users access to their files, change their attributes, alter them, or delete them. DACs are discretionary because the owner can transfer information access to other users.

5 0
3 years ago
Why should you try out a camera bag before taking it on a vacation?
Triss [41]

Answer:

b or c

Explanation:

4 0
3 years ago
Read 2 more answers
3. Radheshree has to complete her assignment and submit it on the next day. While typing
Dafna1 [17]

Answer:

she can use the onscreen keyboard

this application is present in accessories file in the windows

5 0
2 years ago
Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In 1–2 sentences, descri
Tresset [83]

Carlos Should use a Security Camera to keep track of his physical hardware. Carlos can then use a computer to monitor the security cameras.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their
    14·1 answer
  • Please help
    5·1 answer
  • Which of the following pathways relates to the Architecture and construction career cluster
    7·1 answer
  • You are testing a web application for sql injection vulnerabilities. you send various sql statements which return results on the
    5·1 answer
  • ___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
    8·1 answer
  • What's another word for contact print?
    15·2 answers
  • Who can search the internet and select element base on important words
    13·1 answer
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • Tier 1 networks form the internet ____.​
    15·1 answer
  • What are the challenges of Cyber Law???? Needed ASAP ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!