1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enot [183]
3 years ago
5

Question #1 Mutiple Select Which features are important when you plan a program? Select 4 options. Knowing what you want the pro

gram to do. Knowing how to find the result needed. Knowing what the user needs the program to accomplish. Knowing now many lines of code you are allowed to use Knowing what information is needed to find the result.​
Computers and Technology
1 answer:
Neporo4naja [7]3 years ago
8 0

Answer:

In planning a program, the following features are important.

- Knowing what you want the program to do.

- Knowing how to find the result needed.

- Knowing what the user needs the program to accomplish

- Knowing what information is needed to find the result

You start out by planning on what you want to create. Then you think of what programming language to use. The features to be included and then the task you want this program to accomplish

You might be interested in
A standard for compressing music into computer files that can be easily exchanged on the Internet is called a(n) ______. A. musi
Sophie [7]

Answer:

The correct answer is E. MP3

Explanation:

MP3 (formally MPEG-1 Audio Layer III or MPEG-2 Audio Layer III) is a coding format for digital audio. MP3 as a file format commonly designates files containing an elementary stream of MPEG-1 audio and video encoded data, without other complexities of the MP3 standard. The MP3 format makes it possible to compress a song into a file small enough to be uploaded, downloaded, emailed, and stored on a hard drive.

4 0
3 years ago
How can you protect your information when using wireless technology
Mnenie [13.5K]

Answer: Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.

Explanation:

8 0
2 years ago
What is Identity Theft?
olga55 [171]
A is correct! We did this in Law!

Have a merry Christmas!
5 0
3 years ago
………………….. is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of
frutty [35]
Control <span>is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of the above</span>
4 0
3 years ago
Which of the following is a type of monitor port?
Soloha48 [4]
B. all of those.

just to clarify,
HDMI is the port for monitor and sound.

VGA is for video/monitor port
and display port.... I don't know, but it's a type of monitor port.
7 0
3 years ago
Other questions:
  • You're working at a large industrial plant and notice a tag similar to the one shown in the figure above. Which of the following
    9·2 answers
  • Information systems security is the collection of activities that protect the information system and the data stored in it.
    12·1 answer
  • If you wanted to make certain numbers in a spreadsheet stand out, you should _____.
    11·2 answers
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • Which two tasks are associated with router hardening? (choose two.)?
    6·1 answer
  • A. Calculate the diffusion coefficient for magnesium in aluminum at 450°C.
    14·1 answer
  • The cutting tool that has a zig zag edge is called a?
    9·1 answer
  • You can find synonyms and disciplinary jargon in the ______, _______, and ______ in your search results. You can then use these
    13·1 answer
  • How do you check to see if the user entered more than one character? Complete the code.
    14·1 answer
  • C#
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!