1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
12

(TCO B) The symbol shown as a three-sided box that is connected to the step it references by a dashed line is what?

Computers and Technology
1 answer:
xxTIMURxx [149]3 years ago
8 0

Answer:

Annotation symbol.

Explanation:

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

A symbol shown as a three-sided box in a flowchart, that is connected to the step it references by a dashed line is known as an annotation symbol.

This ultimately implies that, it provides additional information in the form of remarks or comments with respect to the steps in a flowchart.

You might be interested in
Ellen is expecting to get a 3% raise next year. She enters .03 in cell D2 so that she can predict her monthly income for the nex
Korolek [52]

Answer: F4

Explanation:

Absolute reference means that we can use a formula for a cell in a Excel and that formula for that particular cell will not be changed even if we copy or drag that formula to some part of the cell.

Excel offers us with the solution of applying formulas to different part of the cells which are indicated by the $ sign. So as in the question Ellen as she is expecting a 3% raise net year in her monthly column, So she can use absolute reference. She enters .03 which is 3 divided by 100 in the monthly income column. So in that column she has to type = for the formula to begin. Then the formula which is .03 and followed by F4 which is used to make the cell D2 absolute reference.

So next time upon referencing cell D2, we would get the value according to the formula.

3 0
3 years ago
¿cuáles son los usos que se le pueden dar a una bicicleta?
riadik2000 [5.3K]

Answer:

pues de decoracion las llantas de columpios y los cuernos de antenas de tele okey no me presiones estoy en clase y acabo de hacer 11 ejercicios y acaba de empezar ok

7 0
3 years ago
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
3 years ago
Client computers cannot function unless they are connected to the network because they cannot access an operating system.
Shtirlitz [24]

Answer: true

Explanation:

As the operating system cannot run from an external device and in a distributed operating system all the clients needs to be connected to the network to share resources via the distributed or network operating system.

8 0
2 years ago
Armando is trying to decide how he will alert players that the game is over in the new video game that he is designing. He is co
mojhsa [17]

Answer:

He is working on the outcome

Explanation:

Because this is the outcome if you fail or die and the other objectives are the following

operation: A single objective in a level of the the whole game

obstacles: Trying to stop the player like blocks or walls or traps

objective:The main goal of the game

8 0
2 years ago
Other questions:
  • The concept of ____ refers to the idea that the internet is designed for all content to be treated equally.
    12·1 answer
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • Which of the following attack is a threat to confidentiality?
    10·1 answer
  • Xavier would like to change the sort options for his contacts. In which tab will he find the Arrangement command group?
    6·1 answer
  • If an author is creating a reference list and wants the second and succeeding lines indented for a reference, they should select
    13·2 answers
  • What do you need to do before you can sort and filter data in a data base?
    12·1 answer
  • Describe Relational Query Languages and Operations.
    15·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    12·1 answer
  • A large amount of data is stored in secondary storage is it true<br>​
    8·2 answers
  • Solve this for brainlest​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!