1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
2 years ago
10

Write an algorithm of telephone call system​

Computers and Technology
2 answers:
Irina-Kira [14]2 years ago
7 0
Step 1 : Start Procedure.
Step 2 : Pick up the phone.
Step 3 : Search for friend’s phone number in the contact list
Step 4 : Select the number and dial it by clicking on the dial button.
Step 5 : Wait for the network to connect.
Step 6 : If connection is successful, you will hear the dialer tone,
Else if network connection failure, number will not be dialled
Else if number is busy, hear busy tone
Else if number is not reachable, hear number not reachable message.
Step 7 : End procedure.
ivolga24 [154]2 years ago
3 0

Answer:

this is the correct answer

You might be interested in
Variables make it easier to do what?
defon
<span>D. Make changes to your code
Variables allow the ability to easily substitute numbers for other numbers.
</span>
8 0
3 years ago
Two types of business communications enhanced by desktop publishing are
Likurg_2 [28]
The correct option is D.
The two types of business communication that are enhanced by desktop publishing are internal and external communication. Internal communication refers to the information and ideas that are exchange within the organisation while external communication refers to information and ideas that are exchange between the organisation and the outside world.<span />
4 0
3 years ago
Read 2 more answers
10. Question<br> What are the drawbacks of purchasing something online? Check all that apply.
max2010maxim [7]

Explanation:

1) the quality of purchased good may be low

2) there might me fraud and cheaters

3) it might be risky

4) we may not get our orders on time

7 0
2 years ago
Data that can be used to identity a single individual is known as
lys-0071 [83]

Answer:

Fingerprint Recognition

Explanation:

3 0
3 years ago
Which scientific tool would be primarily used by scientists?
kkurt [141]
My answer is D. All the above :)
8 0
2 years ago
Read 2 more answers
Other questions:
  • Select the correct answer. Which of these is a function of the marketing team of a game development studio? A. creating art elem
    12·2 answers
  • A computer that delivers requested webpages to your computer or mobile device is a(n) _________.
    9·1 answer
  • An example of live footage is when?
    10·2 answers
  • Think about the five steps to writing an algorithm. Why is each step necessary? Why is it important to be precise when writing c
    15·1 answer
  • Pressing the e key while in edit mode will exit the interaction mode<br><br> true<br><br> false
    7·1 answer
  • A BufferedReader has a constructor that takes a single InputStreamReader parameter. InputStreamReader has a constructor that tak
    8·1 answer
  • What is the definition of digital literacy?
    7·2 answers
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • We can create tables in MS. Word from *<br> 2 points<br> Insert Tab<br> Home Tab<br> Mailings Tab
    5·2 answers
  • List one unprofessional AND one professional example of internet/social media
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!