1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
13

Write pseudocode for washing a car using at least five steps.

Computers and Technology
1 answer:
Travka [436]3 years ago
5 0

Answer:

#include <iostream>

int main()

{

bool carWashed{ 0 };

bool washCar{ 0 };

while(carWashed == 0)

{

 washCar();

}

if(washCar == 1)

{

carWashed{ 1 }

}

}

Explanation:

c++

You might be interested in
1. Bones do not change position when the muscles contract and release.
DochEvi [55]
TrueBones do not change position
6 0
4 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
Helppppp meeee eeeeeee eee
zlopas [31]

Answer:

Thats the gas petal i believe so the accelerator

Explanation:

3 0
3 years ago
Read 2 more answers
When leased computing resources can be increased or decreased​ dynamically, they are said to be​ ________.
damaskus [11]

<u>Answer:</u>

When leased computing resources can be increased or decreased dynamically, they are said to be Elastic resources.  

<u>Explanation</u>:

Elastic resources are the resources that are leased and they can be increased or decreased based on the number of users that are using the resource simultaneously. Popular example for elastic resource is Elastic Search EC2, where 2 to 4 servers are allocated to handle the service requests dynamically depending upon the usage. Cloud computing businesses  like Google and AWS Cloud depends on elastic resources.

4 0
3 years ago
Read 2 more answers
&gt;&gt;&gt; import math &gt;&gt;&gt; print(math.Pi) 3.141592653589793 &gt;&gt;&gt; def print_volume(): print ("What is the radi
kvasek [131]
I have no clue what this is asking...
8 0
3 years ago
Other questions:
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • What does px mean in css ?
    13·1 answer
  • Which of the following files has the Ionic styles? ionic.bundle.css ionic.js ionic.css ionic.bundle.js
    13·1 answer
  • What is true about investments and risk
    14·1 answer
  • In the ISO/IEC 27002 framework, _________________ describes the use and controls related to encryption.
    15·1 answer
  • You can use your student ID card to get discounts in all of the following except
    6·2 answers
  • Tech Town has been hit with a bad storm and the town is suffering from severe flooding. The kids have no way to get to school.Te
    7·1 answer
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • How do you distinguish between misrepresentation and embellishment of one’s professional accomplishments on a résumé? Provide an
    14·1 answer
  • What is the output?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!