1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
g100num [7]
2 years ago
8

Which of the following formats can algorithms NOT be written in:

Computers and Technology
2 answers:
umka2103 [35]2 years ago
5 0
Hello there.

Which of the following formats can algorithms NOT be written in:

Answers: Flow Chart 
babymother [125]2 years ago
3 0
I believe the answer is "Structured English" I'll let you know
You might be interested in
Before creating a brief to design a product, what is needed
castortr0y [4]

Answer:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

Explanation:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

8 0
3 years ago
When you divide a picture into thirds, how many parts do you end up with? *
lara31 [8.8K]

Answer:

3

Explanation:

6 0
3 years ago
Read 2 more answers
Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices
Kipish [7]

Disk encryption is highly risky response.

<u>Explanation:</u>

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

5 0
3 years ago
Select the correct statement(s) regarding partial mesh networks.
sweet [91]

Answer: all the answers are correct

Explanation:

Partial mesh networks is simply a packet switching networks which is connected and require that there should be establishment of a circuit before the exchange of packets.

Partial mesh networks are less expensive to implement when they're being compared to the full mesh networks and are also less redundant.

The correct statements regarding partial mesh networks are:

•the number of links connecting nodes in a partial mesh network depends upon the availability and reliability requirements of the network

• switches play an integral role in a partial mesh network, where several paths through the network are available

• redundant links and switches are used to improve the availability and reliability of partial mesh networks

6 0
3 years ago
How does the purchase of office equipment on account affect the accounting equation?
Nina [5.8K]
A. Assets increase, and liabilities decrease.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Pretrial services programs are also known as early intervention programs. <br> a. True <br> b. False
    15·1 answer
  • An investigator obtains consent and HIPAA authorization from subjects to review their medical records and HIV status. He plans t
    8·1 answer
  • Not providing guarding or fall protection for workers on a 25-foot scaffold. The resulting fall would most likely end in death,
    6·1 answer
  • Henrietta, the owner of a very successful hotel chain in the Southeast, is exploring the possibility of expanding the chain into
    15·1 answer
  • What percent of the internet is the deep web?
    14·1 answer
  • Explain three specific &amp; major security threats to internet users. In each case, address whether or not the vulnerabilities
    15·1 answer
  • Which option is created specifically for giving a slide presentation in front of an audience and works when the speaker is utili
    14·1 answer
  • QUESTION 5
    9·1 answer
  • A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of
    13·2 answers
  • Define a function that will return the length of a list
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!