Flowcharts are used as a prototype of an actual program.
First, I will write out the algorithm; which will be used as an explanation of the flowchart (see attachment for flowchart)
The algorithm is as follows;
1. Start
2. Get input for cost of a meal and cost of a drink;
3. Calculate the total cost for a meal and two drinks
4. Multiply the total cost of a meal and two drinks by 7, to get the weekly cost
5. Display the weekly cost
6. Stop
At the end of the algorithm/flowchart, the weekly cost is calculated and printed.
See attachment for flowchart
Read more about algorithms and flowcharts at:
brainly.com/question/18088572
<span> The Bureaus and the Office of Engineering and Technology process applications for licenses and other filings, analyze complaints, conduct investigations, develop and implement regulatory programs and participate in hearings, among other things. </span>
Answer:
Yahoo! mail
Explanation:
In the context, Dona travels most often around the world. While traveling, she has to access her emails from different location and at different times. But in order to keep her luggage light, she never carries the laptop with her. Therefore, Donna uses Yahoo! mail to access her emails.
Donna uses Yahoo mail because she can install the Yahoo! mail app in her phone or tablets which is small in size and of light weight. She is able to organize her Outlooks, Google mails and Yahoo accounts. In Yahoo! mail, Donna is also able to sign in with her any of the non yahoo accounts and it also provides free cloud storage space.
<h3>Answer : B.responsible for the logical order of processing and converting daya</h3>
<h3>Reason</h3>
As i said bro, in CPU there are ALU and CU where ALU is to do mathematics problem and CU where its to processing, converting data. CPU is like the brain of computer. But it can't be the input, the input can get through hardware, not CPU.
Answer: Access control
Explanation:
Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.
A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.
The right answer is Access control
Hope this helps!!