Computers and Technology

Question 1 (2 points) What is a written list of instructions (recipes, assembly instructions, etc.)?

Question 1 options:

Algorithm

Syntax

Flowchart

Pseudocode

Question 2 (2 points)
What is a series of instructions that are used to solve a specific problem?

Question 2 options:

Algorithm

Pseudocode

Syntax

Flowchart

Question 3 (2 points)
What is a graphical representation of a computer program in relation to it works?
Question 3 options:

Flowchart

Pseudocode

Algorithm

Syntax

Question 4 (2 points)
What is the sequence of words/symbols that are used to form a correctly structured sentence/program called?
Question 4 options:

Syntax

Pseudocode

Flowchart

Algorithm

Question 5 (2 points)
IF/THEN statements are part of what we know as Syntax.

Question 5 options:
True
False

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 01:30, Daud2020
What kind of motivation is katrina showing? use the drop-down menu to complete the statement. katrina is using motivation because she is personally interested in learning more.
Answers: 2
image
Computers and Technology, 23.06.2019 04:31, hargunk329
Q13 what function does a security certificate perform? a. creates user accounts b. scrambles data c. identifies users d. creates password policies e. provides file access
Answers: 1
image
Computers and Technology, 23.06.2019 08:30, sofigaviria05
All of these are true about using adhesive except: a. dissimilar materials can be joined. b. mixing tips are product and material specific. c. a specific application gun may be required. d. two-part adhesives are dispensed using two mixing tips
Answers: 3
image
Computers and Technology, 23.06.2019 11:00, jolleyrancher78
What are the possible consequences of computer hacking? what is computer piracy? describe some examples. what are the effects of computer piracy? what are the possible consequences of computer piracy? what is intentional virus setting? describe some examples. what are the effects of intentional virus setting? what are the possible consequences of intentional virus setting? what is invasion of privacy? describe some examples. what are the effects of invasion of privacy? what are the possible consequences of invasion of privacy? what is an acceptable use policy and what is the purpose of the acceptable use policy what is intellectual property and how can you use it?
Answers: 1
Do you know the correct answer?
Question 1 (2 points) What is a written list of instructions (recipes, assembly instructions, etc.)...

Questions in other subjects: