1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlexFokin [52]
3 years ago
7

Please help! first one to answer correctly gets brainliest and thanked

Computers and Technology
1 answer:
jonny [76]3 years ago
6 0
It’s either presentation Because the software is used to create a sequence of texting, graphics and often audio and video to accompany a speech or a public presentation, or letter
You might be interested in
The ____ statement can be used to eliminate the use of certain (flag) variables.
Juli2301 [7.4K]

The break statement can be used to eliminate the use of certain (flag) variables.

<h3>What is break statement?</h3>

A break statement is used to terminate the execution of the nearest enclosing for, do, switch, or while statement in which it appears.

The main purpose of break statement is to destroy the loop as soon as possible. For example if the given code asks a use input a integer number x. If x is divisible by 5, the break statement is executed and this causes the exit from the loop.

The advantage of break statement is it stops the case testing inside the block and break may be used within loops to alter control flow.

Therefore, the break statement can be used to eliminate the use of certain (flag) variables.

Learn more break statement here:

brainly.com/question/15082759

#SPJ4

8 0
2 years ago
What is the purpose of a search engine?
soldi70 [24.7K]
The purpose is to look for the topic that you need to ask a question and to find/get to a website you want to go to. hope this helped :)
4 0
4 years ago
Read 2 more answers
Explain the need for data structures when developing software.
Sergio [31]

Solution:

It is  important because, it has to do operation on so without, data structures and algorithms.

It performs these operation:  

 1)Take an input

2) Process it  

3) Give back the output.

The input can be in any form, for ex while searching for directions on google maps,  the starting point and the destination as input to google maps, while logging in to any social sites, We have to give our email and password as input and so on.

Similarly, in the third step, the computer application gives us output in some form or the other.

To make this process efficient, we need to optimize all the three steps.

4 0
3 years ago
What is the purpose of using specialized supply chain software?
weeeeeb [17]

Answer:

The purpose of supply chain management is

On the most basic level, the purpose of supply chain management is to make inventory readily available in customer facing positions to fulfill demand. ... Supply chain partners must work together to maximize resource productivity, develop standardized processes, eliminate duplicate efforts, and minimize inventory levels

Explanation:

4 0
3 years ago
Danilo is planning the art to include in a business proposal his team is preparing. For which of the following items should Dani
Flura [38]
<span>A photo he found using an Internet search engine</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following JavaScript methods is used to define an object collection based on a CSS (Cascading Style Sheets) selecto
    15·1 answer
  • 50 points, and brainliest if u get it right!
    13·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    5·1 answer
  • Disadvantages of computer. ​
    9·1 answer
  • int FindFirstCharFrom(char* str, char *sought); The function FindFirstCharFrom takes pointers to two C strings as arguments, str
    13·1 answer
  • Can you adopt me in the orphanage u saw Tammy after school?
    7·1 answer
  • Anyone wanna talk im 13 eboy single
    11·2 answers
  • How to save an edited document.​
    6·1 answer
  • List out any four hardware and software components required for multimedia​
    10·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!