1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katyanochek1 [597]
3 years ago
5

Question #1

Computers and Technology
2 answers:
Yuki888 [10]3 years ago
8 0

Answer:

Knowing what the user needs the program to accomplish.

Knowing what you want the program to do

Knowing how to find the result needed.

Knowing what information is needed to find the result.

Explanation:

Sonbull [250]3 years ago
5 0

Answer:

Multiple Select

Which features are important when you plan a program? Select 4 options.

Knowing what the user needs the program to accomplish.

Knowing how to find the result needed.

Knowing what information is needed to find the result.

Knowing what you want the program to do

Explanation:

It is the other 4, and not Knowing how many lines of code you are allowed to use.

You might be interested in
which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
stepladder [879]

Answer:

is correct answer

(a)first come first serve

Explanation:

8 0
3 years ago
Which of the following is ideal for long distance communication ?
Vinvika [58]
Microwave transmission is ideal for long distance communication. It is so good that it is used for satellite and space probe communication.
3 0
4 years ago
The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value
Trava [24]

Answer:

Pattern.

Explanation:

The pattern attribute can be used only with input boxes that store text.

Generally, the pattern attribute cannot be used with other types of data in computer programming.

Basically, it comprises of data types which mainly includes an attribute of the text, e-mail, telephone, uniform resource locator (URL), search input types and password which must all be matched with the input value in order to pass an authentication or authorization.

3 0
3 years ago
Review how to write a for loop by choosing the output of this short program.
Natalija [7]

This for loop will output:

0

2

4

The range(3) is all the integers between 0 inclusive and 3 exclusive. 0, 1, 2.

Every iterations through the for loop, we multiply the value of each number by 2 and print it to the console.

0 * 2 = 0

1 * 2 = 2

2 * 2 = 4

I hope this helps.

5 0
3 years ago
Read 2 more answers
Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?
Aleksandr-060686 [28]

Answer:

a. WS-Trust

Explanation:

WS-Trust can be defined as a WS-specification as well as OASIS standard that help to provides extensions to WS-Security, in order to facilitate a mechanism for issuing, renewing, as well as validating of security tokens which is why the aim and objectives of WS-Trust is to help and enable applications to construct trusted SOAP message exchanges.

Nevertheless WS-Trust enables the issuance as well as the dissemination of credentials within several and various trust domains.

5 0
3 years ago
Other questions:
  • A list of the slides in a presentation is found here.
    7·2 answers
  • When you hear or see the warning signal of any emergency vehicle, you should ________________.?
    14·1 answer
  • What type of interview would be most likely for the following scenario?
    11·2 answers
  • THE bestValue PROBLEM Using the Camera structure defined in file p1.cpp, write the function named bestValue(). The function take
    13·1 answer
  • Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
    14·1 answer
  • Path of the signal of television
    6·1 answer
  • Making sure that your business has something special and distinct to offer is known as?
    12·1 answer
  • What does the CFO of a company do
    14·1 answer
  • Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and
    10·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!