1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
4 years ago
9

Drag the tiles to the correct boxes to complete the pairs.

Computers and Technology
2 answers:
Mice21 [21]4 years ago
8 0

Answer:

Operation open purpose

Zigmanuir [339]4 years ago
6 0

Answer:

attach the question?

Explanation:

You might be interested in
You have used loops for repetitive processes.
zzz [600]

Answer:

for

Explanation:

because:

  • IF = conditional
  • WHILE = conditional
  • DO = isn't a loop function
5 0
3 years ago
Write the pseudocode for the following scenario. The final exam marks for 10 students are 65, 45, 78, 65, 89, 65, 79, 67, 75, an
tia_tia [17]

The pseudocode of the program serves as a prototype of the program

<h3>How to determine the pseudocode?</h3>

The pseudocode of the program is as follows:

  1. Start
  2. Declare array MARKS
  3. Input MARKS[0] to MARKS[9]
  4. Sort MARKS
  5. Print MARKS[9] ----- this prints the highest mark
  6. Print MARKS[0] ----- this prints the least mark
  7. FOR I = 0 TO 9; ADD MARK[I] TO TOTAL
  8. Print TOTAL
  9. Print TOTAL/10
  10. Stop

The above pseudocode gets input for the array; then sorts the array before performing the required operations

Read more about pseudocodes at:

brainly.com/question/24735155

4 0
2 years ago
The components of hardware include:
zlopas [31]

Answer:

A

Explanation:

Monitor, CPU, Disk Drives, Printer, Keyboard/mouse

5 0
3 years ago
Read 2 more answers
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?]
MrRa [10]

Answer:

The correct answer to the following question will be "Checksum".

Explanation:

A variable that reflects the amount of several bits in a transmitted packet and is used by practitioners of IT to spot heavy-level anomalies in the transmission of data, known as Checksum.

  • After executing a cryptographic hashing algorithm each piece of information or a document could be allocated a value of checksum before delivery.
  • We are relevant because we are using them to verify the authenticity of the documents.

So, it's the right answer.

3 0
3 years ago
____________ is using digital media safely, responsibly, and ethically.
Ronch [10]

I think it may digital citizenship

8 0
4 years ago
Read 2 more answers
Other questions:
  • A network in which communication passes from one person to another in a sequential pattern rather than being shared among member
    6·2 answers
  • How to the inverse function of f(x)=x2 +1 ,x&gt;o
    5·1 answer
  • Identify one type of business or organization that you believe would have serious risks if they chose to use VLANs and/or VPNs.
    5·1 answer
  • Write the java statement to creat an object mp4 class digital​
    8·1 answer
  • A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status
    11·1 answer
  • Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
    7·1 answer
  • 9.2 code practice edhesive
    14·1 answer
  • Which of the following describes all illustrations created by freehand?
    15·1 answer
  • Chris needs to modify the default bullets that are used in a nonnumbered list in Word.
    12·2 answers
  • Draw
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!