The logical structure in which one instruction occurs after another with no branching is a ____________.

Answers

Answer 1

Answer:

sequence

Explanation:

The logical structure in which one instruction occurs after another with no branching is a sequence.


Related Questions

Technology is used today in manufacturing, health care, and the transportation industry, but education has not yet embraced
it.
True
Оr
False

Answers

Answer:

False

Explanation:

Digital learning tools are nowadays used In Education. Countries like Japan, China, India and Korea use computers and internet in their educational system.

Hope it helps!

One property of light that makes it possible to record the image of an object with the camera

Answers

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

define Microsoft Excel 2010​

Answers

Answer:

a very very old Microsoft application that only people on old pc's use now

Explanation:

Answer:

Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.

This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.

Explanation:

In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.

Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.

The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.

which advanced boot option starts windows, but loads only the drivers necessary for basic functionality

Answers

Answer:

The correct answer is: The Safe Mode

Explanation:

Safe Mode is an advanced boot option available in Windows. It is of two categories:

Safe Mode  and Safe Mode with Networking (this option allows inter and intra network conectivity)

It is useful for troubleshooting a windows operating system to find out why it is dysfunctional.

It can be activated by pressing the F8 key as the Windows Operting system boots up, but not after.

Cheers!

A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?

Answers

Answer:

Key escrow

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In conclusion, the option which the company should use is a key escrow.

when files on storage are scattered throughout different disks or different parts of a disk, what is it called

Answers

Answer:

File Fragmentation or Fragmented Files

What is the ghosted text or picture behind the content on the page?​

Answers

Answer:

Watermark

Explanation:

This is actually called a Watermark. It is usually used as a way of showing the name or logo of the author who owns the content that is underneath the watermark. This is done so that individuals cannot steal the owner's work and use it as their own. Usually, the owner has the original version of the content without any watermark, as well as individuals that have purchased the content or a licence to use the content for personal or commercial usage.

Change the case of letter by​

Answers

Answer:

writing it as a capital or lower case.

Explanation:

T - upper case

t - lower case

not sure if that is what you meant or not

Answer:

Find the "Bloq Mayus" key at the left side of your keyboard and then type

Explanation:

Thats the only purpose of that key

What are the three ways you can add recipients to your marketing emails? Add a list of contacts, add individual contacts, or save the email as a sales email. Add a list of contacts, add individual contacts, or save the email as a services email. Add a list of contacts, add individual contacts, or save the email for automation. Add individual contacts, save the email for auto

Answers

Answer:

Explanation:

The three ways of doing this are to add a list of contacts, add individual contacts, or save the email for automation. The list of contacts would be added as a single file containing a large collection of contacts which would all be imported. Adding individual contacts would be done one by one would need to be done manually. Lastly, we have saving the email for automation which would automatically add the email and the contact info asociated with that email to your marketing emails.

Answer:

add a list of contacts, add individual contacts, or save the email for automation

Explanation:

Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system to support automated services, and __________ are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. A. contingent IDs, system accounts B. system accounts, contingent IDs C. systems administrator accounts, contingent IDs D. control partners, system accounts

Answers

Answer: B. system accounts, contingent IDs

Explanation:

Aside from human user types, there are non human user groups. Known as account types, (system accounts) are implemented by the system to support automated services, and contingent IDs are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. The system account is refered to as the user account which the operating system creates during installation.

Therefore, the correct option is B.

computer can do work very___​

Answers

Answer:

Explanation:

quickly      

Answer:

fast......................

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes

Answers

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

como se llama el arte de pintar en las cuevas sus actividades de caceria

Answers

shsibdhebduduebsisodbduei


A company has a website that has seen a large increase in visitors and they are concerned that if the trend continues, the web server's performance will be compromised. You have been asked to help solve this problem without having to replace the current server. What can you do

Answers

Answer:

Install a second server and load balancer

Explanation:

Considering the scenario described above and to solve this problem without having to replace the current server, what I will do is to carry out "installation of a second server to provide additional capacity for the server and install load balancer which helps in managing and allotting incoming requests or application traffic to any ready server prepared of fulfilling them.

Technology is used today in manufacturing,health care , and the transportation industry,but education has not yet embraced it? true or false

Answers

Answer:

True! its answer raise to a correct sentence..

Hope the will come to anyone's need..

Answer:

False

Explanation:

Technology in the form of digital tools are now being used in education in many countries for example: Japan, China, India and Korea. Some educational systems are using computers and internet systems.

hope it helps!

Write down the name of two attributes used along <img> tag.Single line text.​

Answers

Answer:

SRC: it specifies the URL of the image

ALT: it specifies an alternate text for an image

A sponsored link was delivered 100 times, and 10 people clicked on it. Calculate the click-through rate.

Answers

Answer:

10%

Explanation:

100 / 10 = 10

1.what is a computer?
2.what is input device?
3.what is output device?
4.what is system unit?​

Answers

1. an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
2. a peripheral device, as a keyboard or stylus, used to enter data into a computer for processing.
3. Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered. An example of output is the electricity produced by a power plant. An example of output is producing 1,000 cases of a product.

4. A system unit is the part of a computer that houses the primary devices that perform operations and produce results for complex calculations. It includes the motherboard, CPU, RAM and other components, as well as the case in which these devices are housed.

explain the importance of using onedrive in windows 10, and how knowledge of it will have an impact on today's workplace

Answers

Answer:

The importance of using Onedrive it helps save stuff if you have no more room on your computer it helps with schooling and works for jobs you have Microsoft Teams, Onedrive, Outlook, Office 365. It gives all sorts of things that you can use for anything contacts on Outlook and Teams.

A company runs sensitive technologies locally, while entrusting less-sensitive technologies to a broader user base. Which cloud delivery model is being used

Answers

Answer:

Hybrid cloud

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Infrastructure as a Service (IaaS).

2. Software as a Service (SaaS).

3. Platform as a Service (PaaS).

Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Open PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Hybrid PaaS.

A hybrid cloud combines both the features of a private and a public cloud to provide cloud-related services to the end users.

In this scenario, a company runs sensitive technologies locally while it entrusted technologies that are less sensitive to a broader user base.

Hence, the cloud delivery model which is being used here is a hybrid cloud.

Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File

Answers

Answer:

Explanation:

1.Save and Save As

The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name

2.Blank Document and Template

Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template

3. Existing File and Recently Open File

Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist

Elabora un argumento sobre como nuestras acciones impactan en la calidad del aire y promueven acciones a favor del cuidado del ambiente y la salud

AYUDAAAAA!!!!!!!!

Answers

Answer:

Reduzca la cantidad de viajes que realiza en su automóvil. Reduzca o elimine el uso de chimeneas y estufas de leña. Evite quemar hojas, basura y otros materiales. Evite el uso de equipos de jardín y césped que funcionen con gas.

#CarryOnLearning

Which practices promote efficient keyboarding? Check all that apply.

curving your fingers a little when you rest them lightly on the home keys
returning to the home key after you have typed another key
keeping your eyes on your hands when typing
working at a comfortable pace when typing
using your thumbs for the space bar
never using a shortcut

Answers

Answer:

Curving your fingers a little when you rest them lightly on the home keys returning to the home key after you have typed another key

Explanation:

It is important to position the fingers on the keyboard in such as way that they are prepared to move when selecting keys. The fingers should be slightly curved and the hands should be down

At the start of typing, the left fingers should be placed on the A, S, D, and F keys, while the right fingers should be placed on the J, K, J, and ; keys

Answer: both thumbs should be on the spacebar

Explanation:

On a scale of 1-10 how would you rate your pain

Answers

Explanation:

There are many different kinds of pain scales, but a common one is a numerical scale from 0 to 10. Here, 0 means you have no pain; one to three means mild pain; four to seven is considered moderate pain; eight and above is severe pain.

open accomplishing your task I was able to​

Answers

Answer:

WTH KINDA QUESTION IS THIS !

I DON'T UNDERSTAND DUDE

Program design tools. __________ uses English-like statements to outline the logic of a computer program. __________ graphically shows the step-by-step actions a computer program will take.

Answers

Answer:

Pseudocode; flowchart.

Explanation:

Pseudocode uses English-like statements to outline the logic of a computer program. A pseudocode gives a summary of the steps adopted during a software development process using simple (concise) words and symbols.

A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

Basically, a flowchart make use of standard symbols such as arrows, rectangle, diamond and an oval to graphically represent the steps associated with a system, process or workflow sequentially i.e from the beginning (start) to the end (finish).

Robyn needs to ensure that a command she frequently uses is added to the Quick Access toolbar. This command is not found in the available options under the More button for the Quick Access toolbar. What should Robyn do?

Answers

Answer:

Access Quick Access commands using the More button.

Explanation:

To ensure that a command she frequently uses is added to the Quick Access toolbar Robyn would need to "Access Quick Access commands using the More button."

To do this, Robyn would take the following steps:

1. Go / Click the "Customize the Quick Access Toolbar."

2. Then, from the available options, he would click on "More Commands."

3. From the "More Commands" list, click on "Commands Not in the Ribbon."

4. Check the desired command in the list, and then click the "Add" button.

5. In the case "Commands Not in the Ribbon" list, did not work out Robyn should select the "All commands."

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

You manage the information systems for a large manufacturing firm. Supervisory control and data acquisition (SCADA) devices are used on the manufacturing floor to manage your organization's automated factory equipment. The SCADA devices use embedded smart technology, allowing them to be managed using a mobile device app over an internet connection. You are concerned about the security of these devices. What can you do to increase their security posture? (Select two.)

Answers

Answer: Install the latest firmware updates from the device manufacturer.

Verify that your network's existing security infrastructure is working properly

Explanation:

Since the person is concerned about the security of these devices, in order to increase their security posture, the latest firmware updates should be installed fom the device manufacturer.

The firmware is the software program or set of instructions which is programmed on a hardware device. Installing the latest update is necessary in order to prevent third party use or hacking. Also, it's vital to check the network's existing security infrastructure in order to check if it's working properly.

Adobe gives away the Acrobat Reader to build a market for the sale of software that creates Acrobat files. This is an example of:

Answers

Group of answer choices.

A. firms giving away products for half of a two-sided market to seed the market.

B. one market attempting to conquer a new market by making it a subset, component, or feature of its primary offering.

C. firms spreading costs across increasing units of production or in serving multiple customers.

D. firms taking advantage of complementary products developed for a prior generation of technology.

E. markets, once considered distinctly separate, beginning to offer similar features and capabilities.

Answer:

A. firms giving away products for half of a two-sided market to seed the market.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

An open-source software is a type of software in which end users are granted the permission to use, study, modify, copy and share the software with its source code anyhow.

In this scenario, Adobe giving away the Acrobat Reader to build market for the sale of software that creates Acrobat files. Thus, this is an example of firms giving away products for half of a two-sided market to seed the market.

Other Questions
Tony walks at an average speed of 70 m/min from his home toschool. If the distance between his home and the school is2100 m, how much time does it take for Tony to walk toschool?min What are the side of triangle PQR What is the surface area of the rectangular prism pictured below?3 meters9 meters4 meters Health and Wealth Company is financed entirely by common stock that is priced to offer a 15 percent expected return. If the company repurchases 25 percent of the common stock and substitutes an equal value of debt yielding 6 percent, what is the expected return on the common stock after refinancing The Law of Sines: Mastery Test ? In triangle ABC, how long is side a if A = 24, C = 55, and c = 3? O 1.49 O 1.31 O 6.04 O 0.1 A cleaning product company is having trouble with the pH control of one of their products. The product should be slightly basic but the pH is too high. What could the company try to correct the pH of the product Which are the roots of the quadratic function f(q) = 92 125? "Fine! Avery said, pushing a stack of books away and looking up at the clock on the wall. "But our papers due in three days and we still dont have topic. What are we going to do?"Its obvious, isnt it? Maritza asked. "You write why Rosa Parks is so great, and Ill do the same for Irene Morgan. And then well put it all together.Which best describes the relationship between character and conflict in the excerpt? ok look i know ya'll are tired of me but please help Which of these situations are represented by the integer shown on the number line? Select all that apply.The stock market fell five points yesterday.The temperature is five degrees below zero.Shanti found a five dollar bill.The team lost five yards on their last play. Cul de estos pintores no se conoca como surrealista?A. Salvador DalB. Georges Braque.O C. Andr BretonD. Joan MirSUBM The speed of light_____ meters per second Helppppp and explain pls and thankyouuu packaging materials for processed What single decimal multiplier wouldyou use to increase by 9% followed by6% decrease? Which of the following would not have been the job of a poor working-classwoman?A. Laundry workerB. Office workerC. CookD. Seamstress A body weighing 50 N is placed on a wooden table. How much force is required to set it into motion? Coefficient of friction between the table and the body is 0.3. A, B and C are collinear points. B is between A and C. AB=3x+4 BC=4x-1 AC=8x-9 Find AC Des cubrimiento de america whats the answer? how do I solve this? how do you solve 2x+320=425