Each of the flowchart segments in Figure 3-24 is unstructured. Redraw each segment so that it does the same processes under the same conditions, but is structured.

Each Of The Flowchart Segments In Figure 3-24 Is Unstructured. Redraw Each Segment So That It Does The

Answers

Answer 1

The segments of the flowcharts have been recreated such that  it does the same processes under the same conditions, but is structured. Their respective pseudo codes have also been created. See the attached pdf.

What is a pseudo code?

A pseudo code is a notation used in program design that looks like a simplified computer language.

Why is it important for flow chart to be structured?

This preference derives from the fact that such flowcharts are easier to understand and produce less mistakes in human perception.

The organized flowchart primarily aids the mission in the development of new algorithms by encapsulating a variety of data points within an interconnected depiction.

Learn more about flowcharts at;
https://brainly.com/question/6532130
#SPJ1

Each Of The Flowchart Segments In Figure 3-24 Is Unstructured. Redraw Each Segment So That It Does The
Each Of The Flowchart Segments In Figure 3-24 Is Unstructured. Redraw Each Segment So That It Does The
Each Of The Flowchart Segments In Figure 3-24 Is Unstructured. Redraw Each Segment So That It Does The
Each Of The Flowchart Segments In Figure 3-24 Is Unstructured. Redraw Each Segment So That It Does The

Related Questions

Explain an example of a blacklisting program and how it works

Answers

A blacklist might consist, for example, of a list of names developed by a company that refuses to hire individuals who have been identified as union organizers; a country that seeks to boycott trade with other countries for political reasons; a LABOR UNION that identifies firms with which it will not work

What is the value of six sigma ? How dose it relate to agile management

Answers

For an agile team, Six Sigma would provide them with a structured approach for empirical problem solving.

Which of the following criteria was a key milestone for the object-relational model created in the mid-1980s?

Answers

The use of the inheritance to have a structure inherit attributes and methods of classes above it.


One of the key milestones in the period in which the object-relational model was created was the creation of a data
model that closely represented the real world. In this approach, objects were created in which both data and its
relationships were all contained in one place. These data models were becoming a norm to be stored on the web. They
also incorporated support for star schemas within data warehouses. Objects that had similar characteristics were
grouped into classes, where they had a shared structure of attributes and behaviors.

One of the milestones during this period was the use of Unified Modeling Language to represent the data models. The correct option is C.

What is object-relational model?

Using object-oriented programming languages, object-relational mapping is a programming technique used in computer science to convert data between type systems. As a result, the programming language becomes a "virtual object database" that may be used.

One of the significant achievements throughout the development of the object relational model was the development of a data model that accurately reflected the real world.

Using this method, objects were constructed that contained all of the data and the relationships between it. The storage of these data models online was starting to become standard.

Additionally, they included support for star schemas in data warehouses. Classes would be composed of comparable structures with similar shared characteristics and actions.

Thus, the correct option is C.

For more details regarding object-relational model, visit:

https://brainly.com/question/29642352

#SPJ2

Your question seems incomplete, the missing options are:

a.)One of the milestones during this period was introducing the schema.

b.)One of the milestones during this period was the creation of a tuple or a table row within a relation.

c.)One of the milestones during this period was the use of Unified Modeling Language to represent the data models.

d.)

One of the milestones during this period was focusing on having support for large databases at a terabyte size.

What is the term used to describe a singular container in an Excel spreadsheet?
O worksheet
Otab
Ocell
Orange

Answers

Cell is the term used to describe a singular container in an Excel.

What is a single box in a spreadsheet?

An active cell as seen in an Excel worksheet, is one which is made up of small rectangle or box called cell.

Note that the active cell is one that has the selected cell and it is where the data is entered if a person begin typing.

Hence, Cell is the term used to describe a singular container in an Excel.

Learn more about spreadsheet from

https://brainly.com/question/4965119

#SPJ1

Answer:

it is d

Explanation:

You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report needs to be filed. What should you do? Write a two-page paper specifying who in your company you need to talk to first and what evidence must be turned over to the police.

Answers

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

Issue of  internal policy violation

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

https://brainly.com/question/13198827

#SPJ1

Consider an individual who wishes to ensure that their information remains secure and confidential, possibly to secure their personal and financial information. They are involved in communications via the internet and possibly posting information to websites. In terms of leaving evidence on the system what would be their key concerns?

Answers

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them.

What is system hack?

System hacking is a term that connote when a person or a computer user has a compromise between computer systems and software that tends to access the target computer and steal their information or others.

In terms of leaving evidence on the system,  their key concerns is their data protection and someone hacking into the system or reading their browsing history to use it against them as well as their privacy been exposed.

Learn more about system hack from

https://brainly.com/question/13068599

#SPJ1

Question 3 (5 points) ✔ Saved Janice is scrolling through her feed one day and notices that Abby said some awful things about Patricia. Janice thinks that what Abby is doing to Patricia is wrong, but she decides to log out of her account and ignore the cyberbullying. In this situation, Janice is a/an cyberbully. O advocate. O Internet troll. O bystander.​

Answers

Since Janice did ignore the cyberbullying, one can say that she is a  bystander.​

Who is a bystander?

The term connote a person that is said to be a nonparticipant spectator and in this case the person will do nothing even if someone is been killed in their presence.

Hence, Since Janice did ignore the cyberbullying, one can say that she is a  bystander.​

Learn more about bystander from

https://brainly.com/question/8516593

#SPJ1

In this situation, Janice is considered as a: D. bystander.

Who is a bystander?

A bystander can be defined as an individual that physically witnesses bullying or cyberbullying in digital forms such as social media, websites, and software applications.

In this context, we can infer and logically deduce that Janice is considered as a bystander because she witnessed how Abby said some awful things about Patricia.

Read more on bystander here: https://brainly.com/question/8516593

#SPJ1

You are creating a family budget for the year, using a spreadsheet application. Which is the best category of software to apply here?

Answers

In the case above, the best category of software to apply here is  operating system and application.

What is the operation operating system?

An operating system is known to be the tool that gives room for a computer user  to be able  to interact along with the system hardware.

Note that In the case above, the best category of software to apply here is  operating system and application.

Learn more about software from

https://brainly.com/question/1538272

#SPJ1

What describes Accenture's approach to automation?

cloud-centered

human-centered

machine-centered

intelligence-centered

I don't know this yet.

Answers

Answer:

intelligence - centered

Explanation:

I hope it helps you

You are given a list of N integers . find the largest sum of a continuous sequence from the given list

Answers

Explanation:

di5ditdi5suufsutydskydjgsukstralurilttdljstp7hzpgxuptdoyd

two types of storage memory​

Answers

Answer:

Primary and Secondary memory

Primary memory includes ROM and RAM

Secondary memory includes CD, hard drive, etc

Fill in the blanks to help write this professional e-mail:



✔ Hello Mr. King,

My boss asked me to get feedback from an expert on our proposed project schedule.
✔ Would you be willing to look at my document?

The file is attached.
✔ If you can get your feedback to me by the end of the week, that will help me meet my deadlines.


✔ I appreciate your help,

Sam

Answers

The Fill in the blanks of this professional e-mail is given below:

What is the email about?

The Manger,

Dangete group.

To Mr. King,

                    Email on project presentation schedule

I want to inform you regarding the project. My boss asked me to get feedback from an expert on our proposed project schedule. I  do not know if you be willing to look at my document and if you are,  The file is attached.

The project has a fixed deadline and as such,  If you can get your feedback to me by the end of the week, that will help me meet my deadlines. Thanks for your understanding. I appreciate your help.

Yours faithfully,

San  

Learn more about email from

https://brainly.com/question/25886641

#SPJ1

11. Written and artistic expressions are protected by
A. digital ethics.
OB. intellectual property law.
0000
OC. infringement.
D. social media.

Answers

Answer:

B

Explanation:

Written and artistic expressions are protected by intellectual property law.

Using any loop construct, write a java code to print the following:
1010101
10101
101
1​

Answers

Answer:

class Main {

 public static void main(String[] args) {

   for (int n = 0x55; n > 0; n /= 4) {

     System.out.println(Integer.toBinaryString(n));

   }

 }

}

Explanation:

Because the pattern is very regular, you can start with 0x55 (which is 0101 0101) and shift right 2 places everytime. Shift right 2 places is the same as dividing by 4.

Help please!, explain what is missing and what needs to be changed if anything.

Answers

Using the computer language in JAVA to write a function code that output numbers in reverse

Writting the code in JAVA:

import java.util.Scanner;

public class LabProgram {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       int[] userList = new int[20];

       int numElements;

       numElements = scnr.nextInt();

       for (int i = 0; i < numElements; ++i) {

           userList[i] = scnr.nextInt();

       }

       for (int i = numElements - 1; i >= 0; --i) {

           System.out.print(userList[i] + " ");

       }

       System.out.println();

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

A/An ____ is a picture that shows the information that is created, stored, and used by a business system. normalization, entity relationship diagram, data flow diagram, data model​

Answers

Answer:

entity relationship diagram ( ERD)

I am trying to sum up a set of data based on 2 criteria (needs to have "green" in column E, and "January 2020" in collum A). Column D is the set of numbers I need to add. I am getting "Error, array arguments in SUMIFS are of different size.

Answers

In summing the set of data using the 2 criteria, the best way to do it is to avoid the error is that On cell G16, one should type the formula "=SUMIF(G2:G11, ">=40")".

What is the code about?

In computing, Formulas seen  In Microsoft Excel are known to be employed to be able to generate some outcome or values to any cell.

Note that the formula need to begin with an equal sign. The formula that is written above has the function "SUMIF" that helps to give the  sum of numeric values as a result of the condition.

Learn more about  SUMIFS from

https://brainly.com/question/19595606

#SPJ1

Your boss sends you an e-mail with some criticism of a report you submitted. Which of the following is the best way to respond?

THAT REPORT WAS PERFECT!
I will work on incorporating your suggestions before our deadline.
Do not respond at all. She will come find you if she wants to know if you read the e-mail.


The answer is B for whoever needs it on brainly.

Answers

Answer:

the answer is b for whoever needs the help

Using computers can lead to a number of physical safety issues. State and explain TWO(2) of these types of issues.​​​​​

Answers

The types of issues that is seen are:

Electrocution Fire Tripping over wires and others.

What is the physical safety about?

There are a lot of of physical safety issues that can come up from using ICT devices.

A fire outbreak can occur if there is an issue with the wiring of the computer system or when there is too much voltage supplied and this is therefore a type of physical safety issues in the computer room.

Note that Electrocution is said to be the death or bad injury that is known to be caused as a result of an electric shock from electric current that tends to pass through the body.

Hence, The types of issues that is seen are:

Electrocution Fire Tripping over wires and others.

Learn more about Electrocution from

https://brainly.com/question/1810934

#SPJ1

Write an algorithm and flowchart for finding the area of a rectangle

Answers

Hi! I don't have an answer but someone asked the exact same question and someone answered with both the algorithm and flowchart for the rectangle.

hope this helps!

https://brainly.in/question/15178855

the size of a newly created folder on the computer is

Answers

Answer:

2,345,696 bytes

Explanation:

in order to figure out how many bytes a newly created folder is right click the folder and go into properties

How would you use SQL to change a table's structure? What general types of changes are possible? Which commands are used to implement these changes?

Answers

The SQL is used to change a table's structure by:

The use of the SQL ALTER TABLE command.

How is it done?

The SQL ALTER TABLE command is known to  be that which is often used to alter the structure of an existing table.

It is known to help one to be able to add or delete columns, make or destroy indexes, alter the kinds of existing columns, rename columns or the table itself.

Note that  It can also be used to alter the comment for any kind of table and type of the table therein.

Learn more about SQL from

https://brainly.com/question/25694408

#SPJ1

when analyzing threats, which of the following would be classified a low threat? A. A flood in a Florida data center B. A terrorist attack on a buildinh in california c. Hurricane damage to an electrical generatinh facility in lowa D. RA social engineering attack on a centers for Disease Control and Prevention​

Answers

When analyzing threats, the following occurrence would be classified as a low threat: C. hurricane damage to an electrical generating facility in lowa.

What is a low threat?

A low threat can be defined as a type of threat that is not likely to cause failure, harm, or severe injury, especially because it is characterized by minimal (low) risk.

In this context, we can infer and logically deduce that hurricane damage to an electrical generating facility in lowa would be classified as a low threat when analyzing threats.

Read more on low threat here: https://brainly.com/question/8066984

#SPJ1

2 The following image shows the number of orders Company A received in 2015-2020. A financial analyst wants to calculate the year-over-year growth rate of the orders and has entered the formula for 2016 in cell C4. What steps should the analyst take to apply the same formula to all adjacent years using the Macabacus' Fast Fill Right shortcuts?​

Answers

In the above case, the thing to do is to Press Ctrl + Shift + Right Arrow to select cells C4 to G4, then press Ctrl + R.

What are Computer shortcuts?

A computer shortcuts are known to be a composition of one or a lot of keys that bring about a command in software or operating system.

Hence, In the above case, the thing to do is to Press Ctrl + Shift + Right Arrow to select cells C4 to G4, then press Ctrl + R.

See options below

Select cell C4, then press Ctrl + Shift + R

Press Ctrl + Shift + Right Arrow to select cells C4 to G4, then press Ctrl + R

Select cell C4, then press Ctrl + R

Press Shift + Right Arrow to select cells C4 to G4, then press Ctrl + R

Learn more about Computer shortcuts  from

https://brainly.com/question/12531147

#SPJ1

lists Five Examples of simple statement

Answers

Answer:

I am from Nepal . I am 15 years old. I have a good family . I am interest in speaking . I have many hobby.

Answer:

I like cats. cars are fascinating. I like coffee. I am a reader. I read 19 books every year.

Discussion Topic
Personal finance includes income as well as expenses. You must manage your
personal finances daily, weekly, or monthly. Discuss the advantages of using
spreadsheets for managing personal finances.

Answers

The advantages of using spreadsheets for managing personal finances is that:

Spreadsheets are known to be tools that are very quick and easy and helps one to add into a workflow. Spreadsheets are regarded as an efficient tools for financial documents. A person can have access to a lot of spreadsheet templates and they can be able to visualize data along with caveats.

What is the advantage of using a spreadsheet?

The Advantage is that it is one that help[s a person to be able to organizing a lot of data.

Note that The advantages of using spreadsheets for managing personal finances is that:

Spreadsheets are known to be tools that are very quick and easy and helps one to add into a workflow. Spreadsheets are regarded as an efficient tools for financial documents. A person can have access to a lot of spreadsheet templates and they can be able to visualize data along with caveats.

Learn more about spreadsheets  from

https://brainly.com/question/26919847

#SPJ1

Write a function expand_string(a, pre, suf, num) that takes the parameters a,pre,sub and num appends the prefix pre, and suffux suf to the string a num times and returns the new extended string. Input: a=test, pre=pr, suf=su, num=2. Output: prprtestsusu. In Pyrhon, please. ​

Answers

Answer:99

Explanation:88

class Main {

static int[] createRandomArray(int nrElements) {

Random rd = new Random();

int[] arr = new int[nrElements];

for (int i = 0; i < arr.length; i++) {

arr[i] = rd.nextInt(1000);

}

return arr;

}

static void printArray(int[] arr) {

for (int i = 0; i < arr.length; i++) {

System.out.println(arr[i]);

}

}

public static void main(String[] args) {

int[] arr = createRandomArray(5);

printArray(arr);

}

}

Modify your code to use an enhanced for loop.
ty in advance

Answers

See below for the modified program in Java

How to modify the program?

The for loop statements in the program are:

for (int i = 0; i < arr.length; i++) { arr[i] = rd.nextInt(1000); }for (int i = 0; i < arr.length; i++) { System.out.println(arr[i]); }

To use the enhanced for loop, we make use of the for each statement.

This syntax of the enhanced for loop is:

for(int elem : elems)

Where elem is an integer variable and elems is an array or arrayList

So, we have the following modifications:

i = 0; for (int num : arr){ arr[i] = rd.nextInt(1000); i++;}for (int num : arr) { System.out.println(num); }

Hence, the modified program in Java is:

class Main {

static int[] createRandomArray(int nrElements) {

Random rd = new Random();

int[] arr = new int[nrElements];

int i = 0;

for (int num : arr){

arr[i] = rd.nextInt(1000);

i++;

}

return arr;

}

static void printArray(int[] arr) {

for (int num : arr) {

System.out.println(num);

}

}

}

public static void main(String[] args) {

int[] arr = createRandomArray(5);

printArray(arr);

}

}

Read more about enhanced for loop at:

https://brainly.com/question/14555679

#SPJ1

Convert 105 decimal to 128 binary form

Answers

Answer:

1101001 is binary 105

128 in binary is 10000000

Write a function that creates a new string from a given string (as a function parameter) that consists of no digits. example get_not_digits (" Hi Mr. rober53. how are you today? today is 08.10.2019.", returns "Hi Mr. Rober. how are you today? today is.." lika a string. Help: check if the character is letter using isalpha method, and if it's digit use isdigit. Please help in Pyrhon?​

Answers

Chicken with a side of fries is c is the answer x-9(6)^2
Other Questions
In the roman soldier model for refraction, the soldiers have to stay in line or else they will be o a. yelled at b. shot c. flogged d. beheaded What aspect is not similar between cimabue's madonna ethroned and rathnambhava, the transcendent buddha of the south? Antipsychotic medications work well on ________ symptoms associated with schizophrenia but are less effective on ________ symptoms. Evaluate the extent to which trans-atlantic interactions from 1600 to 1763 affected the ameridas Which triangle is a translation of triangle P? please help me im in a rush _____ sanctions attempt to precisely and explicitly regulate peoples behavior. they can be positive (such as military decorations) or negative (such as imprisonment). write a short paragraphy on 1 techniques to tackle the cold weather in this summer In an amortized mortgage, the monthly payment is the same each month. The part used to pay the principal increases each month, while the amount going toward interest ______. sharon mixed meat with potatoes in the ratio 7 : 3 to make 4kg of meat loaf. how much meat did she use How do you drive with CARE?Drivers ED Is it possible for a producer to be on another level of enery pyramid besides the bottom? What addition/subtraction equation should I put? If the prefix hydro were used to name a ternary acid, what problem would this create when naming chloric acid Please help!! is there a solution to z = x + y for a right triangle? Use the drawing tool(s) to form the correct answer on the provided graph.Graph the solution to this system of inequalities in the coordinate plane.3y 2x+122x + y 5 In AABC, if AB = 14 and BC = 9, AC may be equal toA. 13B. 23C. 25D. 5 Please helpppppppppppp Match the expressions to their solutions or equivalents. (-3/8) + (-1/8) A method of sampling that enables researchers to specify for each case in the population the probability of its inclusion in the sample is referred to as ______ sampling.