1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hoa [83]
3 years ago
13

Write the pseudocode to this flowchart.

Computers and Technology
1 answer:
aleksandr82 [10.1K]3 years ago
4 0

Answer:

I don't understand

Explanation:

You might be interested in
Give me 3 facts and 3 opinions
zzz [600]

Hello!

I assume you mean 3 facts about computer/technology based things.

Fact: Certain computers are built for video games, where others are not.

Opinion: All computers suck when trying to use video games.

Fact: Not all computers are made for multiple purposes.

Opinion: All good computers are made by apple.

Fact: You can plug in certain things such as keyboards or a mouse, but not all computers have this.

Opinion: Only good computers have built in keyboards and a mouse.

3 0
3 years ago
What is something you can do to stay connected to the relationships in your life while we spend this time at home?
LekaFEV [45]

Answer: Anything that allows you to either talk or videochat with friends or family.

6 0
3 years ago
PLZZZ HELP!!!!!!!
jek_recluse [69]

Answer: A is the correct choice.

5 0
3 years ago
Security and protection as it relates to operating systems is grouped into four categories: Availability, Data integrity, Authen
Ivahew [28]

Answer:

The answer is "Confidentiality".

Explanation:

Data Security is also known as protection against unauthorized computer access, files, and pages through digital information protection. The protection of data also prevents data from bribery.  

  • It applies to both the security of data from unwanted entities being obtained.
  • It allows accessing sensitive data, which may be able to do so.
4 0
4 years ago
Which of these is a valid use of the Reply All feature?
zalisa [80]

Answer:

I think is None of this ,

6 0
3 years ago
Other questions:
  • Helllllp: Virtual private networks require a secure remote connection.<br> True or False?
    10·2 answers
  • A type of touch screen that can be up to four feet by six feet is a(n) _____. plasma screen multitouch interface Electronic Pape
    10·2 answers
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • Referential integrity states that:______.
    15·1 answer
  • What is displayed on the console when running the following program? class Test { public static void main(String[] args) { try {
    10·1 answer
  • A group of computers that are interconnected in order to share information or documents is called what?
    13·1 answer
  • Which programming language represents data in the form of a series of zeros and ones​
    7·1 answer
  • Historically, storytelling passed down the most important ideas about life, family, and society from generation to generation; t
    10·2 answers
  • Complete the sentence.
    5·1 answer
  • Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value w
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!