SOMEONE PLEASEE *URGENT**

Sequencing and Flowcharting
Try writing out the sequence of events for one of the simple instructive processes below:

1. Drawing a square on a piece of 8 x 11 paper.
2. Moving from your 2nd-period class to your 3rd-period class.
3. Adding a new contact to your list of cell phone contacts.

Now, create a flowchart that outlines how to complete your chosen sequence of events. You may wish to reference these common flowchart symbols as you work.

Submit
1) In the text box: Your sequence of events written out.

2) A file image of your flowchart outlining that sequence of events.

Answers

Answer 1
hope this helps!!!!!
SOMEONE PLEASEE *URGENT** Sequencing And FlowchartingTry Writing Out The Sequence Of Events For One Of

Related Questions

I need a code that will calculate total workers hourly pay and overtime pay.

Part timers work 20 hours a week and they get "time and a half" for each overtime hour past 20 hours

NO IF STATEMENTS ALLOWED

Answers

Using the knowledge in computational language in python it is possible to write a code that will calculate total workers hourly pay and overtime pay.

Writting the code:

hrs = float(input("Enter Hours:"))

name= str(input("enter your name"))

rate = float(input("""how many days did you work?""")

if hrs <= 40 :

pay = 1.5 * hrs

elif hrs > 40:

pay = (rate * 40) + (rate1.5(hrs-40))

else:

print("dear", name , "your salary will be pend till next month")

print("Dear", name, "we are paying you:", "$",pay

See more about python at brainly.com/question/18502436

#SPJ1

What is it called when a programmer includes a step in an algorithm that
allows the computer to manage its data so that the programmer can return to
it later?
OA. Sequencing
OB. Selection
C. Iteration
OD. Storage

Answers

Explanation:

sequencing is thecorrect answer .

Answer:

D.storage

just did it

Explanation:

Can you please show me how to do this?

Answers

Answer:

yes

Explanation:

contact me on 0572574872

and I'll show u

WHICH OF THE FOLLOWING IS A CLASSICAL ALGORITHM APPLIED TO MEDERN CRYPTOGRAPHY
A: LINEAR SEARCH
B: PSEUDORANDOM NUMBER GENERATOR
C: BINARY SORT
D: MODULAR ARITHMETIC

Answers

The option of the  CLASSICAL ALGORITHM that is known to apply to modern CRYPTOGRAPHY is known to be called option B: PSEUDORANDOM NUMBER GENERATOR.

What is a pseudo random generator in cryptography?

In regard to the theoretical computer science and cryptography, a pseudorandom generator (PRG) is known to be used for a class of statistical tests.

It is said to be one that is known to be a kind of a deterministic method that is often used in the mapping if a random seed so that it can be able to be a longer type of pseudorandom string.

It is one where there is no need for statistical test in the class that can be used to tell the difference between the output of the generator as well as that  of the uniform.

Therefore, The option of the  CLASSICAL ALGORITHM that is known to apply to modern CRYPTOGRAPHY is known to be called option B: PSEUDORANDOM NUMBER GENERATOR.

Learn more about CRYPTOGRAPHY from

https://brainly.com/question/88001
#SPJ1

What's language processor?​

Answers

Answer:

A language processor is a software program designed or used to perform tasks such as processing program code to machine code. Language processors are found in languages such as Fortran and COBOL.

Compilers, interpreters, translate programs written in high-level languages into machine code that a computer understands. And assemblers translate programs written in low-level or assembly language into machine code.

10 rules of Computer ethics​

Answers

Explanation:

what???????????......

What is the Full form of DSLR

Answers

adjective
denoting or relating to a camera that c
camera with a digital imaging sensor,
"the ideal candidate will also have exp
Digital single lens reflex

Adam has to write a paper where the margins need to be set to these measurements:

Left: 1.5"

Right: 4"

Bottom: 1"

Top: 1"

How could he go about setting these measurements up?

Launch the Page Setup dialog box from the Page Setup group; in the Margins section, enter the page margin values and click OK.
Click on the Margins button in the Page Setup group; select a preset margin option that matches the margin values.
Launch the Page Setup dialog box from the Page Setup group; in the Paper size section, enter the page margin values and click OK.
Click on the Layout tab in the ribbon; in the Paragraph group, enter the margin values in the Indent and Spacing boxes.

Answers

Answer: Click on the Margins button in the Page Setup group; select a preset margin option that matches the margin values.

Explanation: hope this help
stay safe brainliest is appreciated :)

Priya received an e-mail that appears to be from a social media website she has an account with. The e-mail asks her to confirm that she received the e-mail by replying with her password.
What should Priva do?
O ignore the e-mail and delete it © reply with her password © replv without including her password
O ask her friends how they responded

Answers

She should immediately ignore the email and delete it.

Match each number system to set of symbols used to represent numbers in that system.
binary
hexadecimal
Digits
the digits 0 to 9
0 and 1
decimal
the digits 0 to 9 and the letters from A to F
Reset
Next
Number System
>

Answers

Answer:

1. The digits 0 to 9 --> decimal

3. 0 and 1 --> binary

2. The digits 0 to 9 and the letters from A to F --> hexadecimal

main circuit board inside personal computers which holds the majority of computer components and provides connectors for peripherals

Answers

The main circuit board inside personal computers which holds the majority of computer components and provides connectors for peripherals is motherboard.

What is motherboard?

A computer's main board is referred to as the "system board" or "motherboard," while smaller ones that plug into slots on the main board are referred to as "boards" or "cards." See also the terms motherboard, expansion card, and flexible circuit.

The motherboard is the primary wire harness of a computer. It's a thin plate that houses the CPU, memory, hard drive and optical drive connectors, expansion cards to control video and audio, and connections to your computer's ports (such as USB ports).

Thus, the answer is motherboard.

For more details regarding motherboard, visit:

https://brainly.com/question/28329392

#SPJ1

Assume that x, y, and z are int variables. Write a statement using the conditional operator (? :) that compares the values of the variables x and y. The value of the larger of the two variables should be assigned to z.

Answers

The statement using the conditional operator (? :) that compares the values of the variables x and y will be:

public class Main {

   public static void main(String[] args) {

       int x = 10;

       int y = 20;

       int z = (x > y) ? x : y;

       System.out.println("z = " + z);

   }

}

How to illustrate the information?

The ternary conditional operator (?:) has three operands and accepts them all. A boolean expression that can be evaluated as true or false makes up the first operand. The second operand is executed if the boolean statement evaluates to true. The third operand is executed if the boolean expression returns false.

It should be noted that because 10 is not greater than 20, the boolean statement (x > y) in this program evaluates to false. As a result, the third operand (y) is executed, and z is given the value of y (20).

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Answer:

z = (x > y) ? x : y;

Explanation:

The conditional operator in C++ is the "? :" operator. This operator checks a condition and then returns one of two values, depending on whether the condition is true or false. The syntax for the conditional operator is:

(condition) ? value_if_true : value_if_false;

z = (x > y) ? x : y; checks if the value of x is greater than y. If it is, then the value of x is assigned to z. If it is not, then the value of y is assigned to z.

What is the purpose of a frame check sequence (FCS) footer?

Answers

Answer:

Frame check sequence (FCS) refers to the extra bits and characters added to data packets for error detection and control.

Explanation:

Network data is transmitted in frames. Each frame is comprised of bits of data appended to the header, which holds basic information such as source and destination media access control (MAC) addresses and application. Another set of characters is added to the end of the frames, which are checked at the destination. Matching FCSs indicate that delivered data is correct.

Dynamic Computer Programs Quick Check (Help pleasee!!)

Which best explains why many organizations want computer programs that are adaptable to different computing platforms? (1 point)

A. maintenance costs are lower across a single platform

B. lower maintenance costs, better user experience, and higher agility

C. not important to most companies

D. able to switch between platforms with no negative impact on user experience

2.why were different devices developed over time?

A. Computing and technical advances

B. To use different software

C. Experiment with new platforms

D. To integrate connectivity in new devices

3. What determines if a program is scalable?

A. Having the ability to be downloaded to different platforms

B. Accessible libraries

C. Memory storage

D. Stability during changes, upgrades, overhauls, and resource reduction

4. What is the difference between a single platform and a dynamic adaptive platform?

A. All programs that make use of the internet devices are dynamic

B. On a single platform, a device only functions in one type of environment like on the cloud or hardware whereas a dynamic adaptive platform can be downloaded from the could or installed on the hardware or accessed remotely via mobile

C. Single and dynamic platforms are the same, so there is no difference

D. Single platforms exclusively make use of networking tools

5. How does the concept “garage collector” affect a programs scalability?

A. The concept of scalability is itself invalid

B. Memory management does not impact scalability

C. The garage collector or (memory management) idea is not a valid concept

D. A good garage collector frees up more memory so programs can transition effortlessly into other platforms

Answers

The answer choice that best explains why many organizations want computer programs that are adaptable to different computing platforms is D. ability to switch between platforms with no negative impact on user experience.

The main reason why different devices were developed over time is A. Computing and technical advances

The answer choice that determines if a program is scalable is D. Stability during changes, upgrades, overhauls, and resource reduction

The difference between a single platform and a dynamic adaptive platform is B. On a single platform, a device only functions in one type of environment like on the cloud or hardware whereas a dynamic adaptive platform can be downloaded from the could or installed on the hardware or accessed remotely via mobile

What is a Computer Program?

This refers to the set of instructions that are given to a computer system to be able to execute specific tasks.

Hence, we can see that the way the concept “garage collector” affects a program's scalability is D. A good garage collector frees up more memory so programs can transition effortlessly into other platforms

Read more about computer programs here:

https://brainly.com/question/23275071

#SPJ1

Select the correct word to complete the sentence.
The original ARPANET had four nodes and connected groups at
dispersed.
to research computers that were geographically

Answers

The original ARPANET had four nodes and connected groups at academic institutions to research computers that were geographically dispersed.

What purpose did the ARPANET serve?

The primary applications of ARPANET were in academia and research. Since the ARPANET is regarded as the precursor to the current internet, many of the protocols used by computer networks today were created for it.

Note that the ARPANET, in full term is said to be an Advanced Research Projects Agency Network, experimental computer network that was said to be the first ever use of the Internet.

Therefore, The original ARPANET had four nodes and connected groups at academic institutions to research computers that were geographically dispersed.

Learn more about ARPANET from

https://brainly.com/question/2323287
#SPJ1

If I am designing an application, which code to I input to create a link​

Answers

Answer:

[tex]{ \tt{ < a \: href = url > < a > }}[/tex]

The last must be a closing tag

Identify two uses of 3D printing that help doctors and patients in hospitals.​

Answers

Answer: Prosthetic and Diagrams

Explanation:

Prosthetics are made by 3D printing, used as a new stand in for a missing limb. Like if you were to loose a leg or an arm, 3D printing creates the outer shell most times. Diagrams are used to show examples to patients of their condition, or even sometimes for other doctors to get a better understanding of a condition. They may show them to patients to give an example of what may need to happen too. For doctors they may also be used to figure out what plan of action may be needed.

If a cell displaying #DIV/0! Contains the formula =C2/D9, what must be the value of cell D9?

Answers

Heya! The value of Cell D9 must have a 0. Have a good day!

in python Simple geometry can compute the height of an object from the object's shadow length and shadow angle using the formula: tan(angleElevation) = treeHeight / shadowLength. Given the shadow length and angle of elevation, compute the tree height.

Sample output with inputs: 0.4 17.5
Tree height: 7.398881327917831

Answers

Answer:

import math

angle = float(input('Enter Angle: '))

shadowLength = float5(input('Enter Shadow Length: '))

tree_height = math.tan(angle)*shadowLength

print('Tree Height = {}'.format(tree_height))

Explanation:

From the equation given, the first step is to derive the equation for calculating the Tree Height.

In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.

The program then prompts the user to input values for angle and shadow length.

The inputted values are converted to floats and used in the equation that was derived for Tree height.

Three height is evaluated and the result is printed to the screen

HELP NOW!
Which of the following makes the varied types of digital communication possible?


an agreed-upon set of rules and standards governing the way technology shares and manages data


properly linking all of the workstations on a closed loop-like configuration


refraining from relying too heavily on one central hub that connects all nodes on a system


only using a high-quality server computer with lots of memory

Answers

Answer:

An agreed-upon set of rules and standards governing the way technology shares and manages data

Question 23. Which of the following is NOT a useful vehicle feature from a security perspective O Internal hood release lever O Power locks O Wi-Fi capable O Lock on gas cap O Power windows​

Answers

Answer: internal hood release lever

Explanation:

Cindy wants to install a new application on her computer. This application requires the operating system to have 1 gigabyte in working memory to function properly. Which of the following system requirements does Cindy need to check for compatibility?

Answers

Answer:  She needs to check her systems storage. (The working memory)

Explanation: In order to know if she can get the application she needs to check those things it requires.

Hope this helps-

Even though the terms operating memory and short-term memory are frequently used interchangeably, some theorists contend that the two memory types are distinct from one another because working memory permits the manipulation of information.

What system storage working memory to function properly?

In contrast to long-term memory, which stores a large amount of knowledge over a lifetime, working memory is the little amount of information that may be kept in mind and used to carry out cognitive tasks. One of the most often used concepts in psychology is working memory.

Working memory is the short-term storage of information, in contrast to long-term memory, which accumulates a huge quantity of information throughout a lifetime. That has been stored, while short-term memory only refers to the temporary storing of information.

Therefore,She needs to check the storage on her computer. She needs to check the things the application needs in order to determine whether she can obtain it.

Learn more about system storage here:

https://brainly.com/question/28585157

#SPJ2

Similarities between the primary memory and the secondary memory​

Answers

Answer:

Primary and secondary

Explanation:

Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.

which type of files removed by Disk Cleanup took up the most space?

Answers

The type of files that can be removed by Disk Cleanup that took up the most space are:

Temporary Internet Files groupRecycle Bin files

Does Disk Cleanup remove all files?

Disk Cleanup is known to be a process that helps to free up space on any kind of hard disk, making an  improved system performance.

Note that  Disk Cleanup is one that searches your disk and then depicts temporary files, Internet cache files, as well as unnecessary program files that a person can be able to safely delete.

Therefore, based on the above, one can say that The type of files that can be removed by Disk Cleanup that took up the most space are:

Temporary Internet Files groupRecycle Bin files

Learn more about Disk Cleanup  from

https://brainly.com/question/26328363
#SPJ1

What is a problem? Give an example of a business problem and discuss how a computer-based information system could solve it?​

Answers

For example lets take a business that provides IT services, so the company might face majority of issues and one of them could be outdated system and equipments, in result this can make the business owner suffer from the complexities of integrating new hardware or software into their existing networks, so lastly its always important to have a regular maintenance on your current devices and to use support services when necessary.

How many ways can we write a list of 6 numbers from (1, 2, 3, 4, 5, 6, 7, 8) without repeating any?

Answers

Explanation:

[tex] \binom{n}{\\ k} = \binom{6}{8} = \frac{8 \times 7 \times 6 \times 5 \times 4 \times 3}{6 \times 5 \times 4 \times 3 \times 2} = 28[/tex]

We divide by factorial of 6 (!6) what is 6×5×4×3×2×1 so that there is no repetition.

Answer:

Explanation:

Number of combinations:

[tex]C_{8}^6 = \frac{8!}{(8-6)!*6! } = \frac{6!*7*8}{2!*6! } = \frac{7*8}{1*2} = \frac{56}{2}=28[/tex]

A ____________ transmits data packets from one computer network to another computer network.

Answers

Answer:

internet

Explanation: i got a b so if its rong sorry

A network switch transmits data packets from one computer network to another computer network.

What is a network switch?

A network switch connects devices in a network (such as computers, printers, and wireless access points) and allows them to 'talk' by exchanging data packets.

Switches can be both physical hardware devices that manage physical networks and software-based virtual devices.

A router is significantly more advanced and sophisticated than a switch. They can perform Network Address Translation (NAT), make faster routing decisions, and use routing algorithms to route data across large networks.

Routers connect multiple LANs, whereas switches operate within a single LAN.

A network switch connects and transmits data packets to and from local area network devices (LAN).

Thus, the answer is network switch.

For more details regarding network switch, visit:

https://brainly.com/question/14583548

#SPJ2

Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False

Answers

Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

2. InDesign is the industry standard for editing photos is a true statement.

3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.

4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.

What lossy compression means?

The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after  it has undergone decompression.

Note that data here tends to be permanently deleted, which is the reason  this method is said to be known as an irreversible compression method.

Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

Learn more about File compression from

https://brainly.com/question/9158961

#SPJ1

I hear random heartbeats during my calls,what is this? Is this anything bad or anything dangerous to do with spying or hacking?

Answers

Answer:

It is a type of rhythmic thumping, pulsing, throbbing, or whooshing only you can hear that is often in time with the heartbeat. Most people with pulsatile tinnitus hear the sound in one ear, though some hear it in both. The sound is the result of turbulent flow in blood vessels in the neck or head.

Explanation:

String Challenge RUBY!!!!
Have the function String Challenge (num)
take the num parameter being passed and
return the number of hours and minutes the
parameter converts to (ie. if num = 63 then the
output should be 1:3). Separate the number of
hours and minutes with a colon.
Examples
Input: 126
Output: 2:6
Input: 45
Output: 0:45

Answers

The function string in Java is used to create the program as seen below.

How to create a Java String?

/*

Description: Using the Java language, have the function TimeConvert(num) take the  num parameter being passed and return the number of hours and minutes the parameter converts to (ie. if num = 63 then the output should be 1:3). Separate the number of

hours and minutes with a colon.

*/

import java.util.*;

import java.io.*;

class Function {  

 String TimeConvert(int num) {

 

  int hours = num/60;

  int minutes = num%60;

  String output = hours + ":" + minutes;

   

     

   return output;

   

 }

 

 public static void main (String[] args) {  

   // keep this function call here    

   Scanner  s = new Scanner(System.in);

   Function c = new Function();

   System.out.print(c.TimeConvert(s.nextLine()));

 }  

 

}

Read more about Java String at; https://brainly.com/question/14610932

#SPJ1

Other Questions
Do you believe that people are the product of their environment? Why or why not? after surgery for repair of a myelomeningocele, the nurse places the infant in a side-lying position with the head slightly elevated. what is the main reason the nurse places the infant in this position after this particular surgery? Nora left her house and drove to the store. She stopped and Went inside . From there, she drove in the same direction until she got to the bank. She stopped it and went inside the bank. Then she drove home. The graph below shows the number of blocks away from home Nora in X minutes after after she left her house, until she got back home. How long was Nora in the bank Why did the red cross helped people If a ball is thrown upward at a speed of 10 m/s, and it reaches a height of 5.1 meters, how longwill it be in the air total? what characters have you met through reading other books and stories who also have magical qualities like mrs.whatsit,mrs.who, and Mrs which? a box has four cards numbered 1, 2, 3, and 4. greg will toss a coin once and record the toss as heads (h) or tails (t). then he will randomly pick a card from the box and record the number chosen. give the sample space describing all possible outcomes. then give all of the outcomes for the event that the number chosen is 3. use the format h1 to mean that the coin toss is heads and the number chosen is 1. if there is more than one element in the set, separate them with commas. Help please ;(((((((( 1) What is the difference between spectroscopy and spectrometry?2) Why is it necessary to use a narrow wavelength spectrum of light in spectrometry? Why do we use wavelengths of peak absorbance for a particular analyte?3) What volume of a 100 ppm (part per million) stock solution would be used to create 30 mL of a 10 ppm standard? select the country in africa where spanish is spoken. panama honduras argentina cuba guatemala costa rica venezuela the savior equatorial guinea deep vein thrombosis in mice is regulated by platelet hmgb1 through release of neutrophil-extracellular traps and dna A rectangular painting has an area of 2890square centimeters. What is its area in square inches? Round to the nearest square inch. Do not include the units in your answer. by law, state education agencies (seas) must include students with disabilities in all assessments, with accommodations where appropriate. the number of degrees of longitude that a place has is derived from the angle formed by the places location on earth surface, multiple choice according to law of effect, behavior that is rewarded is less likely to be repeated, whereas behavior that is punished is unlikely to be repeated. a. upjohns b. hillers c. thorndikes d. humboldts e. skinners Correct the term The number of people who are joining the firies in Australia. I will mark brainliest!!!!!!! Create four multiple choice questions about Latin American independence movements that compare and contrast them to the French and Haitian Revolutions. Marisa stood in front of her colleagues and delivered a presentation about how to use their companys new email program. At the end of the presentation, Marisa felt like she did a great job. However, most of the workers had no idea what Marisa was talking about. They were clueless about how to use the new program. How did this happen? Describe how the communication process works so that messages are exchanged and understood, and why Marisas colleagues may not have understood the new email program after her presentation.Sergio has been assigned to write all of his companys social media posts. His supervisor tells him to beware of what he posts because sometimes these messages are misinterpreted by the public. What are three barriers of communication that might occur when people are interpreting social media posts? What steps can Sergio take to try to avoid a misstep with one of these barriers?When Lavonda is conducting online research for her upcoming presentation on Internet etiquette in the workplace, she comes across an amazing presentation someone in Australia created that is exactly what she was planning to create. It would save her a lot of time if she could just change the name of the presenter to her own name and present that exact material as it is written. However, she isnt sure if this is the right thing to do. What is the MOST ethical course of action Lavonda should choose in this scenario? How can she be sure that her choice complies with all applicable rules, laws, and regulations? Stephen is extremely frustrated after a long day at work. He wants to vent on his favorite social media platform. He types, I already have WAY too much to do at work and THEN my colleague tells me shes pregnant and gets to take six weeks off to have a baby! Guess Ill be doing all of her work too. UGH! Before he clicks to post this message, what are four questions Stephen should ask himself to help him assess the ethical and legal implications of his message? If Stephen chose to post this message, how would this message MOST likely be interpreted by someone from his HR department?Veronica is traveling for work. She will be talking to business partners in New York, Paris, South Africa, Saudi Arabia, and Japan. She will be proposing a new product line to a group of executives in each location. How might cultural differences make each of these meetings slightly different from one another? What are some potential communication problems Veronica might face during this multicultural, international business trip? the steering committee decides that the location of the next aom annual meeting should consider the competitive, economic, social, and technological factors affected by the committees decision. in other words, it is using which approach? a property that is common to all microbial cells is . evolution communication between cells differentiation genetic exchange between cells motility