1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
3 years ago
15

Which logic correctly describes an algorithm to find the smallest of the three numbers a, b, and c and store the smallest number

in small?
A.
If a is less than b, then set a to small, else set b to small, else set c to small.
B.
If a is less than b, then set small to a, else set small to b.
If c is less than small, then set small to c.
C.
If a is less than b, then set small to b, else set small to c.
If c is less than small, then set small to a.
D.
If a is less than small, then set small to a.
If b is less than small, then set small to b.
If c is less than small, then set small to c.
Computers and Technology
1 answer:
kherson [118]3 years ago
8 0

Answer:

D

Explanation:

You might be interested in
Anna is looking for a job. Which two types of skills would she find necessary to secure a job ?
Leokris [45]

C . Technical and frequent

i think this is the make sense the most


7 0
3 years ago
What name is given to the assurance that requested information is available to authorized users upon request
mrs_skeptik [129]

Answer:

Availability

Explanation:

With Data availability, it means that we are saying that information is accessible to users. This gives the assurance of the system and also the data being accessible to authenticated users anytime they have the need for it.

It is simply saying that information would be operable by users with authorization whenever they request to.

5 0
3 years ago
Which of the following is computer memory that works while the computer is turned on?
Crazy boy [7]

Answer:

Ron is the answer

Explanation:

In that sense it is similar to secondary memory, which is used for long term storage. When a computer is turned on, the CPU can begin reading information stored in ROM without the need for drivers or other complex software to help it communicate.

5 0
3 years ago
Dora electronically transferred $591.68 from her checking account to Matt's checking account. In what column of the check regist
Allisa [31]
The answer is D.Payment/Debit
4 0
3 years ago
Read 2 more answers
A ____________ is malware that copies itself repeatedly, using up system resources and slowing a system or device until it hangs
kicyunya [14]

Answer:

worm

Explanation:

A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

3 0
3 years ago
Other questions:
  • Use the following business rules to assign name to the tables on the ERD: Note: These rules are in the context of a small retail
    7·1 answer
  • Consider a computer with two processes, H, with high priority, and L, with low priority. The scheduling rules are such that H is
    15·1 answer
  • Consider the following code which deletes all the nodes in a linked list. void doublyLinkedList::destroy() { nodeType *temp; //p
    14·1 answer
  • Access time is:________.
    11·1 answer
  • Which of these is not considered by economists to be a want?
    8·1 answer
  • Your one output statement should occupy two lines in your program
    13·1 answer
  • Select the correct term to complete the sentence.
    7·1 answer
  • Why is being distracted by the sights and sounds of our devices dangerous?​
    12·1 answer
  • When a program uses a ____, it reads all the records in the file from beginning to end, processing them one at a time. Group of
    5·1 answer
  • Which computer language uses short words known as mnemonics for writing programs?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!