What is it called when a programmer includes a step in an algorithm that lets
the computer decide which group of steps to perform?
Alteration
B. Selection
OC. Sequencing
OD Storage

Answers

Answer 1

Selection is the step in algorithm that let's the computer decide which group of steps to perform.

What is Algorithm?

This can be defined as set of instructions which are used for solving a problem or accomplishing a task.

Selection happens when there are one or more options are available in which the computer decide which group of steps to perform.

Read more about Algorithm here https://brainly.com/question/11302120

Answer 2

Answer:

its A

Explanation:


Related Questions

The final step in the software development life cycle involves.

Answers

Answer:

Operation and maintenance

Explanation:

It involves maintenance and regular required updates.

What kind of specialized monitor is used for cell phones with screens that wrap around the edges of the phone and for curved monitors whose edges wrap toward the viewer

Answers

The kind of specialized monitor used for cell phones with screens that wrap around the edges of the phone are flexible screens.

What are flexible screens?

The  flexible screens example is  OLED screens. They are known to be made through the medium of organic materials that is said to often brings out light when electricity is said to be passed through it.

Note that the use of these screens do not need any form of backlights to function as they are produce to be thin enough to the give the place or point where they are said to be of  flexible screens.

Learn more about monitor from

https://brainly.com/question/1590202

9. With each element of the list defining both a key exchange algorithm and a CipherSpec, the list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the __________ .

Answers

The list that contains the combination of cryptographic algorithms supported by the client in decreasing order of preference is the CipherSuite.

What is CipherSuite?

CipherSuite can be defined as a group of instructions used to produce network connections in a secure manner.

CipherSuite is associated with Transport Layer Security, which involves the usage of algorithms to protect data.

Transport Layer Security can be defined as a computational cryptographic protocol aimed at protecting information.

Learn more about Transport Layer Security here:

https://brainly.com/question/14425531

How have computer technology entrepreneurs such as steve jobs and jeff bezos most directly affected the twenty-first-century economy?.

Answers

Answer:

Explanation:

Steve Job and Jeff Bezos has the uniques idea brought into the world, which both of them have similar ideas of how the future of technology should be like, Steve helps push with new innovations like smart devices that we uses, while Jeff use those devices to help people or consumer able to trade like buying and selling on the internet with ease, and behind the scenes, there were trillion of dollars moving around (just the number). Because of their ideas people start to believe or take an advantages of it right away since it was already there for us to be using.

Dear, ( Name of Iphone store)
As soon as I bought my Iphone and got home, it didn't work. If I send it back, can you tell me what is wrong with it or get me a new one?
Thanks!
From ( Your Name )

Answers

Answer:

Yes! The apple store will help you

Explanation:

Which of the following is considered true regarding the future of technology?

It is evolving quickly and always changing.
There will be limited jobs in the future.
Only programmers will work in the computer science industry.
It will replace the need for human workers.

Answers

Hello!

The answer is:
-It is evolving quickly and always changing.

I hope that this helps you!

The range of cells receiving copied content is called the ____ area. A. fill B. range C. location D. paste

Answers

Answer:

The answer is paste.

D. paste

A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext

Answers

Answer:

A block cipher breaks down plaintext messages into fixed-size blocks before converting them into ciphertext using a key.

Explanation:

Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropbox and OneDrive

Answers

The difference is that Dropbox  offers just 2 GB free storage space while  Microsoft's OneDrive gives 5 GB in terms of free storage space.

What is Microsoft OneDrive?

This  is known to be a file hosting software and it also does synchronization service given by Microsoft.

Some other  fundamental difference between Dropbox and OneDrive in terms of  Business is that Dropbox is known to often give unlimited storage for about $20 to paid user/month while OneDrive is said to only give unlimited storage for $10 per paid user/month.

Learn more about Dropbox from

https://brainly.com/question/20935392

You have been asked to acquire a printer for a business. You have been told that it should be easy for users to print to the printer from their smartphones and tablets. What feature should you look for when selecting the printer

Answers

A feature that you should look for when selecting the printer is a wireless connection.

What is a printer?

A printer can be defined as an electronic output (peripheral) device that is designed and developed for printing paper documents containing texts or images.

In this scenario, a feature that you should look for when selecting the printer for this business is a wireless connection because it would make it easy for users to print to the printer from their smartphones and tablets, especially through the use of a bluetooth or wifi.

Read more on printer here: https://brainly.com/question/17100575

Jhon bought a new printer for his desktop computer. It does not work even though he checked all the cables and cords. What do you think he forgot to connect? *


A. The installer
B. The ports and plugs
C. The Device Driver
D. The Utility Software

Answers

i think it’s d sorry if it ain’t ..

A _________________is a weakness that can be exploited either because it is protected by insufficient security controls, or because existing security controls are overcome by an attack. A. Confidentiality B. Integrity C. Authenticity D. Vulnerability

Answers

Has to be D. Vulnerability

If you really had no idea look at your options and notice that D is the only noun too

A computer hacker trying different combinations of characters to crack a password is a ________.

Answers

Answer:

Brute force attack

An ethical code may not address specific issues because…


A. Technology is such a broad area that a code cannot cover it all.


B. Technology evolves so quickly so the code may not be up to date


C. It tests the ethics of personnel and addresses general issues


D. Ethical codes have no legal authority to penalize offenders

Answers

An ethical code may not address specific issues because, technology evolves so quickly, so the code may not be up-to-date.

What is a code of ethics?

A code of ethics is the combination of ethical guidelines and the honest practices which needs to be followed in an organization.

The technology changes at a high rate. It effects on work ethics with the same rate. An ethical code may not address specific as technology moves so fast.

The options of the given problem are,

A. Technology is such a broad area that a code cannot cover it all.B. Technology evolves so quickly so the code may not be up-to-dateC. It tests the ethics of personnel and addresses general issuesD. Ethical codes have no legal authority to penalize offenders

Here, the second option is correct, which talk about the pace of technology.

Thus, an ethical code may not address specific issues because, technology evolves so quickly so the code may not be up-to-date.

Learn more about the ethical code here;

https://brainly.com/question/24606527

#SPJ1

Answer:Below

Explanation:

A computer ______ is a potentially damaging program that affects a computer or device negatively by altering the way it works.

Answers

Hello!

The answer would be: virus.

Explanation, if you’d like to read it:
A computer virus is a type of program that can cause damage to a computer by causing a system failure, corrupting data, and wasting computer resources, among other things.

I hope that this helps you!

The range of cells receiving the content of copied cells is called the ____. A. receiver cell B. final cell C. receiving range D. destination area

Answers

The paste area is indeed the set of cells that will receive copied content, and the further discussion can be defined as follows:

Range cell:  

Inside Excel, a cell range is a cell group that has been chosen. Its range is typically symmetric (square), but it can also comprise individual cells. In a formula, a cell range can also be referenced.It refers to a set of organisms that use the address of the cell first and last cells in the range, separated by a colon, instead of a single cell address.

Find out more about the range cell here:

brainly.com/question/15513083

How to unlock hp laptop forgot password without disk.

Answers

On the sign-in screen, press and hold the shift key, click the power icon , select Restart, and continue pressing the shift key until the Choose an option screen displays. Click Troubleshoot. Click Reset this PC, and then click Remove Everything. Click Only the drive where Windows is installed.

Or you can take it to a person who is a specialist in this situation.

I don’t know I don’t know I don’t know I don’t know

They will choose the design team on 2 April. (change this into passive voice)

Answers

Answer:

On 2 April the design team would be choosen by them

Direction: Complete the sentence by choosing the correct WORD

Answers

Answer:

Maybe try guestimating?

Explanation:

That's what I do sometimes.

Answer:

1. alcohol

2. tighten

3. crosshead

4. dust

5. ammoniated

6. bolts

7. loosen

When developing an output control system, it is important to implement output standards that: (Choose all that apply.)

Answers

When creating an output control system, it is important to implement output standards  or targets that managers think will have good measure efficiency, quality, etc.

What is this system about?

In an output control system, it is important for  managers to first make sure that they set of goals or output performance standards or targets that they believe will best measure in terms of efficiency, quality, etc., for their firm.

Note that this system often acts as a behavior control systems that helps in providing methods that can be used to ensure that workers do well in ways that make the work to be efficient.

Learn more about control system from

https://brainly.com/question/27334060

Web are websites that allow people to congregate online and exchange views on topics of common interest.

a. True

b. False

Answers

Answer:

B

Explanation:

B. False a web is not a Website

What is a program that migrates through networks and operating systems, typically attaching themselves to different programs and databases?.

Answers

A software program that moves through networks and operating systems (OS) by attaching themselves to different programs and databases is a: virus.

What is a virus?

A virus refers to a malicious software program that is typically designed and developed to move through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.

This ultimately implies that, a virus is simply a malicious software program that has the ability to cause severe damage to a computer, databases and user files, if not detected on time and properly managed.

Read more on a virus here: https://brainly.com/question/26128220

Chris needs to take the opposite of a Boolean value. Which operator does so? A. == B. != C. = D. !

Answers

AIf the boolean is A,you would have to do !a

Explanation:

the explamation mark gets the opposite.So if 5 = !A, then A = -5

(dont quote me ,im not 100% postitive)

If a password is entered wrongly three times the computer will

Answers

Answer:lock

Explanation:its a sicuraty thing

You are troubleshooting a DHCP server and discover that it is not dynamically updating DNS records for DHCP clients. What is the most likely cause for this issue

Answers

The most likely cause for this issue is that the DNS server and DHCP server can be seen or found in different domains.

What is DHCP server?

A DHCP Server is known to be a kind of a network server that is said to function by automatically giving and placing IP addresses, default gateways and other kinds of parameters of a network to the computers of their client devices.

Note that  when the DNS server and DHCP server can be seen or found in different domains, the issue of updating automatically can arise.

Learn more about DHCP server from

https://brainly.com/question/10097408

#SJ1

PLEASE HELP!

Make a code that should prompt the user for the prices and quantities of three items. The code should calculate the subtotal of the items. After the subtotal is calculated for your list your code should automatically calculate the sales tax using a tax rate of 5%.
Print out the line items with the quantity and total, and then print out the subtotal, tax amount, and total.

Answers

Answer:

subtotal = 0total = 0tax_rate = 6.5for i in range(1,4):   price = float(input("Enter the price for item " + str(i) + ": "))   quantity = int(input("Enter the quantity for item " + str(i) + ": "))   subtotal += (price * quantity)tax = subtotal * tax_rate/100total = tax + subtotalprint("Subtotal: " + str(subtotal) + ", Tax: " + str(tax) + ", Total: " + str(total))

Explanation:

- Initialize the variables- Create for loop that iterates 3 times- Ask the user for the price and quantity of each item- Calculate the subtotal with given inputs- When the loop is done, calculate the tax and total- Print the subtotal, tax, and total

When would it be necessary to shoot in 4K according to the presentation?

Answers

Answer:

because it provides you a lot of storage and the post production equipment to handle it and it is used to do big projects

Explanation:

so l know this much it is correct please mark me brainllest

Write the pseudocode for two modules which could be incorporated into the application planned for Lungi in Question 1.   The first module must:  a. Allow Lungi to enter the description and size of the blankets.  b. Store the details entered in arrays.  c. Provide Lungi with the option to view the list of blankets captured.  If Lungi wishes to view the list of blankets, the contents of the arrays should be passed to another module.   The second module should:  a. Receive the arrays as arguments.  b. Write the contents of the arrays to a text file that Lun​

Answers

The sample pseudocode for the given question is:

ENTER #blanket size;STORE #blanket;DISPLAY "Do you want to see the blankets captured?" #answer;IF #answer: "Yes";

What is a Pseudocode?

This refers to the informal language that is used by computer programmers to produce an algorithm and is an important step in problem-solving.

The complete pseudocode is:

THENDISPLAY #blanketELSEEND

Read more about pseudocodes here:

https://brainly.com/question/24735155

#SPJ1

An arrangement in which local businesses team up with schools, hiring students to perform jobs that use knowledge and skills taught in their school classes is called a _____. a. vocational education program b. cooperative program c. internship d. service learning

Answers

An arrangement in which local businesses team up with schools, hiring students to do jobs that use skills taught in their classes is called a cooperative program.

What is cooperative program.

The cooperative program in which different firms cooperate with schools to balance the classroom study and practices, enhancing the practical knowledge and develop required skill of students.

Advantages of cooperative program-

Practical learning-Apart from theory learning, in the cooperative program students get the knowledge of practical working and concepts.Experience-In this program, students get the working experience before they graduate.Enhance Network-The students can enhance their network with cooperative team members, with the help of this program.

Thus, an arrangement in which local businesses team up with schools, hiring students to do jobs that use skills taught in their classes is called a cooperative program.

Learn more about the cooperative program here;

https://brainly.com/question/9794781

Answer:

b

Explanation:

im a knower

Write a C program to do the following tasks:

a) Read the grades of students in the class from the keyboard (assume the grades are

integer in the range 0 to 100).

b) Find the average of the grades that are less than 50. If there are no grades less than 50, then display the message "No grades < 50".

c) Find the average of the grades that are greater than or equal 50. If there are no

grades greater than or equal to 50, then display the message "No grades >= 50".


The program should terminate if the input grade is negative. (Hint: Use sentinel-controlled repetition structure). Note that average of the grades might not be an integer and design your program considering that

Answers

Answer:

#include<stdio.h>

void main()

int marks;

printf("Enter your marks ");

scanf("%d",&marks);

if(marks<0 || marks>100)

printf("Wrong Entry");

else if(marks<50)

printf("Grade F");

else if(marks>=50 && marks<60)

printf("Grade D");

else if(marks>=60 && marks<70)

printf("Grade C");

else if(marks>=70 && marks<80)

printf("Grade B");}

else if(marks>=80 && marks<90)

printf("Grade A");

else:

printf("Grade A+");

#may need to replace spaces with tab

Explanation:

it works ( I hope, if it doesn’t tell me what the error is)

Other Questions
While playing a real-time strategy game, Juan created military units for battle: long swordsmen, spearmen, and crossbowmen.Long swordsmen require 75 units of food and 25 units of gold. Spearmen require 40 units of food and 30 units of wood.Crossbowmen require 30 units of wood and 40 units of gold. If Juan used 1475 units of gold, 1500 units of wood, and 4025 unitsof food to create the units, how many of each type of military unit did he create?Juan createdlong swordsmen.Parti How can a reader best decide if a scientific article is current?The reader can check the authors biographical information.The reader can find the copyright date.The reader can look for factual information.The reader can see if the article has multiple sources.I WANT TO GIVE SOMEONE POINTS Which of these would have been a positive effect of the Columbian Exchage? Compared to other fruits like apples, avocados have an extremely short Shelflife. Does this make iteasier or harder for you to supply avocados? Why? If we stopped burning fossil fuels today, what would happen to the climate?. 4-5 practice proving right triangles congruent worksheet 1-7 find the absolute value of -5/8 Express 16 minutes as a percentage of 20 Can someone pleas help??????? why is johnny's condition especially bad? Hint: think about his home life. Find the value of x. Circle geometry. What is the main reason that Jos is upset when he returns from the Mirandas near the end of Antojos?A.He hurt his foot walking back to the car.B.He does not want to go home to his mother.C.He thinks he will not get the dollar because he did not bring help.D.He wanted to see the men with the machetes before they finished fixing the car. please teach me how to do this When an animal cell goes through the process of mitosis, it divides into two smaller cells.In order for the animal to continue growing, these two cells need to become as large as the original cell. How do the cells do this? A. They undergo mitosis again to increase the number of cells in the area. B. They combine with other cells around them to produce larger cells. C. They absorb substances from the matter that the animal eats and drinks. D. They expand by creating areas of empty space inside the cells. Dividing by 1/2 means you are finding how many halves are in the dividend On the eve of the civil war, nearly half a million free blacks lived in the united states, the majority of them in the south. Identify the statements that describe the restrictions under which free blacks lived. What are some of the different substances that make up a pizza?What substances make up water? Differentiate the 3 types of evolution in Science Prove that y=tan(mx) = sin(mx)/cos(mx) describe why the bottom of a pot is painted black and the interior is painted silver