1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
4 years ago
9

Dfd symbols are referenced by using all ____ letters for the symbol name.

Computers and Technology
1 answer:
yawa3891 [41]4 years ago
4 0
All CAPITAL letters]
hope you got your answer
You might be interested in
Design an application for the Sublime Sandwich Shop. The user makes sandwich order choices from list boxes, and the application
Arada [10]

import javax.swing.*;

import java.awt.*;

import java.awt.event.*;

public class JSandwich extends JFrame implements ItemListener {

 FlowLayout flow = new FlowLayout();

 JLabel companyName = new JLabel("Sublime Sandwich");

 JComboBox<String> mainBox = new JComboBox<String>();

 JLabel mainList = new JLabel("Main ingredient");

 JComboBox<String> breadBox = new JComboBox<String>();

 JLabel breadList = new JLabel("Breads");

 JTextField totPrice = new JTextField(10);

 int mainNum, breadNum;

 double[] mainPrices = {6.99, 7.99, 8.99};

 double sumPrice = mainPrices[0];

 double breadPrice = 0;

 double mainPrice = mainPrices[0];

 double[] breadPrices = {0, 0, 0};

 String output;

 public JSandwich() {

   // code here

 }

 public static void main(String[] arguments) {

   JSandwich sandframe = new JSandwich();

   sandframe.setSize(240, 200);

   sandframe.setVisible(true);

 }

 public void itemStateChanged(ItemEvent list) {

   //

 }

}

4 0
3 years ago
An algorithm to find the perimeter of a triangle
KiRa [710]

Answer:

step 1- start

step 2- Input a,b,c

step 3 - perimeter = a+b+c

step 4 - Print the perimeter

step 5 - End

5 0
2 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
write a function deal3 of type 'a list -&gt; a' list whose output list is the same as the input list, but with the third element
qwelly [4]

Answer:

I am writing a python program for this.  

  def deal3(input_list, index):  

   list = []    

   for x in range(len(input_list)):            

       if x != index:  

           list.append(input_list[x])  

   print('list ->',list)      

input_list = [10, 20, 30, 40, 50]  

index = 2

deal3(input_list, index)

Explanation:

  • The first line of code defines a function deal3 which has two parameters. input_list which is an input list and index is the position of elements in the input list.
  • next statement list=[] declares a new list that will be the output list.
  • next statement for x in range(len(input_list)):   is a loop which the loop variable x will traverse through the input list until the end of the input list is reached.
  • the next statement if x != index:  checks if x variable is equal to the position of the element in the list.
  • Next statement list.append(input_list[x]) appends the elements of input list to list( new list that will be the output list). Now the output list will contain all the elements of the input list except for the element in the specified position (index variable).
  • this statement print('list ->',list) prints the list (new output list).
  • this statement input_list = [10, 20, 30, 40, 50]  insert elements 10 20 30 40 50 in the input list.
  • index=2 specifies the second position (3rd element) in the list that is to be removed.
  • deal3(input_list, index) So the function is called which will remove 3rd element of the input list and prints output array with same elements as that in input array except for the element at the specified position.

8 0
3 years ago
(Game Design) A number of elements in a specific order is:
mash [69]

Yes the ansewer is c bc you can look it up!

7 0
3 years ago
Read 2 more answers
Other questions:
  • A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9? A. '=A1+B2 B. '=A2+B3 C
    8·2 answers
  • In a database list, fields are displayed as _____. rows columns tables records
    10·1 answer
  • Use induction on n to prove that fir all n&gt;=2, 2^n+3^n&lt;5^n
    11·1 answer
  • You can access word's typographic characters with the _______ button on the insert tab
    9·1 answer
  • Which flowchart symbol is called the process symbol and contains the steps or actions in the process being depicted?
    6·2 answers
  • Reflect on the questions below.
    7·1 answer
  • What is the most popular monitor​
    11·1 answer
  • How does equal employment opportunity apply to nursing practice?​
    9·1 answer
  • Why is internet download speed slower on a computer vs phone
    9·1 answer
  • When you _______ the top row or the left column, you can keep column headings and row labels visible as you scroll through your
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!