1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
HACTEHA [7]
3 years ago
13

Por favor definir que es un pseudocódigo y que es un diagrama de flujo.

Computers and Technology
2 answers:
marusya05 [52]3 years ago
8 0

Answer:

que

Explanation:

Alex Ar [27]3 years ago
8 0
What did u sayyyyyyyyyyyy
You might be interested in
What is the difference between computer architecture and computer organization?
alukav5142 [94]
The distinction between "computer architecture" and "computer organization" has become very fuzzy, if no completely confused or unusable. Computer architecture was essentially a contract with software stating unambiguously what the hardware does. The architecture was essentially a set of statements of the form "If you execute this instruction (or get an interrupt, etc.), then that is what happens. Computer organization, then, was a usually high-level description of the logic, memory, etc, used to implement that contract: These registers, those data paths, this connection to memory, etc. Programs written to run on a particular computer architecture should always run correctly on that architecture no matter what computer organization (implementation) is used. For example, both Intel and AMD processors have the same X86 architecture, but how the two companies implement that architecture (their computer organizations) is usually very different. The same programs run correctly on both, because the architecture is the same, but they may run at different speeds, because the organizations are different. Likewise, the many companies implementing MIPS, or ARM, or other processors are providing the same architecture - the same programs run correctly on all of them - but have very different high - level organizations inside them.
8 0
3 years ago
Read 2 more answers
A _______ is used to present data in a simplified, graphical format that allows your audience to read less text while still bein
steposvetlana [31]
Your correct answer would be Legend.


answer choice is B.
3 0
3 years ago
Read 2 more answers
Sara is writing a program to input her monthly phone bills and output the month name and amount for the month with maximum amoun
Andru [333]

Answer:

# include <conio.h>

#include <iostream.h>

using namespace std;

main()

{

int billamount[12];

char monthname["January", "February", "March", "April", "May", "June", "July", "August", "September", "October", "November", "December"];

<em>for (int month = 1 ; month<=12; month++)</em>

<em>{</em>

<em>cout<<"Enter the amount of bill for the month"<<month;</em>

<em>cin>>billamount[month];</em>

<em>}</em>

for (i=0; i<= 12; i++)

{

if (billamount[0]<billamount[i])

billamount[0]=billamount[i];

monthname[0]=monthname[i];

}

<em>cout<<"Maximum months phone bill"<<monthname[0]<<"="<<billamount[0]</em>

<em />

getch();

}

6 0
3 years ago
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
3 years ago
James would like to send a document he has saved on the hard drive to coworkers and Ireland Brazil and India. These coworkers ha
frozen [14]
Email the document to them ?

8 0
4 years ago
Read 2 more answers
Other questions:
  • School computer labs are used often to teach technology skills or subject-specific skills ____ the rest of the curriculum.
    11·1 answer
  • Organizational structures with one or more layers of authority between top-level management and employees are known as vertical
    9·2 answers
  • You have connected thirteen pcs and laptops to a wireless network. to make your wlan more secure, what should you do to disallow
    11·1 answer
  • Is a plotter input output or both
    10·1 answer
  • A(n) ____ uses the communication interface to request resources, and the server responds to these requests.
    15·1 answer
  • The post-closing trial balance shows the balances of only the ____ accounts at the end of the period.
    12·1 answer
  • The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the b
    14·1 answer
  • One rule in the Java programming language is that you have to place a semicolon at the end of each statement. What is this rule
    10·2 answers
  • Today's manufacturing workplace is most likely to include
    8·1 answer
  • Aniyah is setting up a group of computers in her office that will share several devices. Which type of operating system should s
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!