1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexus [3.1K]
3 years ago
8

Q Basic program write a program in Q Basic to find the cost of 10 pens when the cost of 15 pens is 75 use unitary method to find

calculate the cost of one pen calculate the print of cost of 10 pen computer answer​
Computers and Technology
1 answer:
Ne4ueva [31]3 years ago
5 0

give the function of cpu

You might be interested in
Pseudocode is an improvement over the IPO chart because it lays out the a0 sequence of steps for a particular program.
Olegator [25]

Answer:

Yes. Pseudocode is an improvement over the IPO chart because it lays out the sequence of steps for a particular program

Explanation:

The input–process–output (IPO) chart is a widely used approach in systems analysis and software engineering for describing the structure of an information processing program or other process. The chart has three components (Input, Process and Output), and you write the description of each component in plain English, not code or mathematical formulas.

Pseudocode is a procedure for solving a problem in terms of the actions to be executed and the order in which those actions are to be executed.

Pseudocode is an improvement over the IPO chart because it shows the step by step sequence to be followed by a particular program unlike the IPO chart which just break the program into Input, Process and Output.

6 0
3 years ago
Which of the following is opened when the Find command is clicked? Question 9 options: Navigation Pane Insert Hyperlink dialog b
Dima020 [189]

The element, from the following options, which is opened when the find command is clicked is the search pane.

What is find command?

Find command is the command which is used to find the list of files and their location.

Find command can be used in different manners-

  • To find the different files in a system.
  • Find command can find the files by their name, size, date or other information related to the required document.
  • This command can be modified with the requirement of the search.

The options for the given problem are-

  • Navigation Pane Insert- It is used to show the navigation pane in word or similar space.
  • Hyperlink dialog box-This open, when the insert hyperlink command is clicked.
  • Bookmark dialog box-This opens, when the bookmark command is clicked.
  • Search Pane- Search pane is opens, when the find commond is clicked.

Thus, the element, from the following options, which is opened when the find command is clicked is the search pane.

Learn more about the find command here:

brainly.com/question/25243683

4 0
2 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Andrew has data in cell E14 and the cell should be blank. Andrew should _____.
denpristay [2]
Use the mouse to click on cell E14 and press delete
4 0
3 years ago
Read 2 more answers
When you’re upset, you’re __ to get into a crash compared to when you’re not upset
Daniel [21]

Answer:

Your answer would be more likely.

Explanation:

When someone is upset and they are driving they usually have their music baring and the they can't hear their surroundings and all they can think about is what they are upset about so therefor they don't pay attention. Hope this helped! Have a great day! :)

7 0
3 years ago
Other questions:
  • In internet terminology, what is the term, .com, called?
    12·2 answers
  • Change control in application development is a formal process for changing written documentation into online documentation, and
    13·1 answer
  • Using the _____ model brings sellers and buyers together on the web and collects commissions on transactions between these parti
    5·1 answer
  • How to get out of the verify your identity page on a dell laptop because it won’t let me
    13·1 answer
  • "PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisi
    7·1 answer
  • Does functionality provided by the app play an important role in a decision to
    13·1 answer
  • Which piece of computer hardware was revised to run hypervisors natively?
    12·2 answers
  • Hard light is usually not good for filming. True False
    11·2 answers
  • The area that we can see just after windows is started is subject​
    6·1 answer
  • Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!