1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Art [367]
3 years ago
11

"if" statements are part of creating computer programs, what are these instructions called and how would you use them?

Computers and Technology
2 answers:
AysviL [449]3 years ago
8 0

Answer:

The person above me is right

Explanation:

P.s Good luck

podryga [215]3 years ago
7 0

Answer:

if means that like (if this happen it will come or not come answer)

Explanation:

sorry I don't know how to tell but plz reply if you understand or not.

You might be interested in
Which two statements describe features of an ipv4 routing table on a router? (choose two.)
solong [7]

The statements that describe features of an ipv4 routing table on a router include:

  • Directly connected interfaces will have two route source codes in the routing table.
  • If a default static route is configured in the router, an entry will be included in the routing table with source code.

It should be noted that the IPv4 route table is important for listing entries that are in the routing table.

The routing table of every router is unique and can be stored in the read access memory (RAM) of the device.

Read related link on:

brainly.com/question/24958077

7 0
3 years ago
How to calculate 3 X (50 + 40) ÷ 5 on excel 2016
kozerog [31]

Answer:

I think this might help, don't know much of this

Explanation:

How do you calculate 3.5 increase in Excel?

How To Increase a Number By a Percentage. If want to calculate a percentage increase in Excel (i.e. increase a number by a specified percentage), this can be done by simply multiply the number by 1 + the percentage increase. - which gives the result 60.

8 0
3 years ago
Read 2 more answers
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
Select the correct answer.
CaHeK987 [17]

Answer:

C. FTP

Explanation:

FTP is a network protocol for transmitting files between computers.

5 0
2 years ago
What is property in educational technology
Maslowich
1. It is based on scientific and technological advancements.
2. It is more a practical discipline and less a theoretical one.
3. It is a fast growing modern discipline.
4. It makes use of the research findings of psychology, sociology, engineering, sciences and social psychology etc., and applies the same to the field of education.
5. It brings pupils, teachers and technical means together in an effective way.
6. It is the science of techniques and methods. It locates the problems in the field of education, remedies them and ultimately aims at improving the education system.
7. It is bound to improve the teacher, the learner and the teaching learning process.
3 0
3 years ago
Other questions:
  • SELECT vendor_name, COUNT(*) AS number_of_invoices, MAX(invoice_total - payment_total - credit_total) AS balance_due FROM vendor
    15·1 answer
  • 15
    5·2 answers
  • The major difference between a template and another document is in _____.
    7·1 answer
  • Write a code to define a structure named student, which includes name, student number and email address
    5·1 answer
  • ___________ key encryption in wep uses the rc4 encryption algorithm.
    9·1 answer
  • Write a program whose input is two integers, and whose output is the first integer and subsequent increments of 5 as long as the
    10·1 answer
  • List any two different between primary memory and secondary memory.​
    8·2 answers
  • Why is it important for organizations to make strong commitment to Cloud at scale?
    14·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • Online platforms that allow users to represent themselves via a profile on a web site and provide and receive links to other net
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!