1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
3 years ago
7

What are the three algorithm constructs?

Computers and Technology
1 answer:
zubka84 [21]3 years ago
5 0

Answer:

The algorithm constructs are sequence, decision/selection and repetition.

Explanation:

You might be interested in
What is it called to persist in trying to multitask can result in this; the scattering bits of one’s attention among a number of
lozanna [386]

Answer: <em><u>is Option B</u></em>.

B<u>)</u>. <u>Multi tasking</u>:   A person capability to carry out more than one task at the same time is called multitasking. Person performing more than one task at the same time is nearly impossible and it's hard for him to focus on each and every detail, thus leading to scatter attention among numbers of things at a time resulting in inaccuracy and greater numbers of fault in final result.

<u>Explanation of other points:</u>

<u></u>

A<u>)</u>. <u>Attention:</u> is defined as performing tasks with special care and concentration.

C<u>)</u>. <u>Continuous partial attention:</u>  Under this category people perform tasks by concentrating on different sources to fetch information by only considering the most valid information among all information. people who use this technique to gather information works superficially concentrating on the relevant information out of numerous sources in a short period of thinking process.

7 0
3 years ago
Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
daser333 [38]

Answer:

Find the explanation below.

Explanation:

Asymmetric encryption is a system of communication in technology between two parties where keys which are variable values coined by an algorithm are used to encrypt and decrypt the messages between the sender and receiver. The two types of keys used in this process are the public and private keys. The public keys can be used by anyone to encrypt messages which are then sent to the receiver who decrypts the message using his private keys. The private keys on the other hand are only shared by the person who first set up the key. In sending messages this way, the receiver's public key is gotten from a public directory, and the message encrypted by the sender. The receiver can then decrypt the message using his private keys. But if the message is encrypted using a private key, it is decrypted by the receiver with a public key.

The one-way nature of this style of communication ensures data integrity and confidentiality since users are not required to disclose their keys and only the two parties can access the message. The two end users also preserve the right to authenticate the keys. The transport layer security protocol makes use of asymmetric encryption.

8 0
3 years ago
What is the cell reference for row 22 and column B? __________<br><br> In excel
vovikov84 [41]
The cell reference is B22

plz thank me, it keeps me motivated to answer more of your questions :)
8 0
3 years ago
You have been asked to advise a group of several universities who want to combine research efforts and store data in the cloud.
inn [45]

Community cloud is best for a group of several universities who want to combine research efforts and store data in the cloud.

<h3>Community cloud</h3>

Community cloud allows for the flexibility and scalability normally found in a public cloud, but it also limits the number of users to a smaller, trusted group.

  • When multiple organizations with similar objectives want to combine efforts in a cloud, the best choice is generally a community cloud.

Community cloud is best for a group of several universities who want to combine research efforts and store data in the cloud.

Find out more on community cloud at: brainly.com/question/25620318

4 0
2 years ago
Which of the following is an example of new and emerging classes of software?
Rama09 [41]
The answer is Smart technology :)
4 0
3 years ago
Other questions:
  • Which loan type requires you to make loan payments while you’re attending school?
    10·1 answer
  • Criminal Investigation people called my house on an automated voice is this a scam ??
    13·1 answer
  • Which of these sites would need additional investigation to check for reliability?
    8·2 answers
  • Privacy settings allow account owners to decide who can ........
    12·2 answers
  • What is 8 hours, 5 minutes, 22 seconds minus (-) 7 hours, 24 minutes, 37 seconds?
    6·1 answer
  • What’s the answer to this question?
    15·1 answer
  • The blue section of the following Venn diagram could represent which of the following Boolean statements?
    14·1 answer
  • Write Tic tac toe program in python for beginners pls
    10·1 answer
  • Miley met up with a bunch of her college friends after several years. She told them that she works for the sound department of a
    5·1 answer
  • In what ways are super computer different from mainframe computers.​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!