1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tanya [424]
2 years ago
14

Design an algorithm that will prompt for and receive pairs of numbers from an operator at a terminal and display their sum, prod

uct and average on the screen. If the calculated sum is over 200, an asterisk is to be displayed beside the sum. The program is to terminate when a pair of zero values is entered.
Computers and Technology
1 answer:
Andrews [41]2 years ago
7 0

Explanation:

The Program is written in Python

You might be interested in
Draw truth table for the following logic circuit:<br><br> (Please I really need help with this)
DENIUS [597]

Keep Scrolling! :D

\rule{999pt}{66646pt}

4 0
2 years ago
What are the possible sources of the information that defines the functional dependencies that hold among the attributes of a re
valkas [14]

A functional dependency describes a relationship between the attributes of an entity such that the value of one attribute is dependent on the value of some other attribute and is very well affected by it.

There can be various sources of information that define functional dependency. For instance, an attribute age can define the functional dependency with the attribute ID. One cannot include the voter ID if they are not above 18 years of age.

Similarly, the attribute date of joining can define the functional dependency with the attribute experience, as the experience in a particular organization can be calculated by subtracting the joining date fro the current date.

3 0
2 years ago
SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and
Alika [10]

Answer:

blueprint.

Explanation:

Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security blueprint.

3 0
3 years ago
Read 2 more answers
What are the Positive and negative sites of the internet
Lynna [10]

Answer:

A positive of the sites of internet is that it can be very helpful to you like brainly. It can also educate you and help when you cant do you something like we have online classes since we can't go to school because of Corona

A negative of the sites of the internet is that sometimes people will try to trick you to do irresponsible things. Some will trick you for your address, credit card number, or using things unwisely. Because people don't know who is behind the screen they might be a criminal but they also don't know who you are until they get your address or information.

Explanation:

8 0
2 years ago
I was just called a man in a wig ugh <br><br> Any tips for doxxing someone?
kondaur [170]

Answer:

Explanation:

hope this help

6 0
2 years ago
Other questions:
  • In Linux Operating System, what file extension is used forexecutable files?
    6·1 answer
  • Launched in 1995, ________ has become the most popular web browser.
    6·1 answer
  • You are working as a Solutions Architect for a technology company which is in the process of migrating their applications to AWS
    15·1 answer
  • How do I write code in Java for "A spinner for a game has four possible options: blue, red, yellow, green. The chance of landing
    10·1 answer
  • What does this result prove about the computer’s network connectivity?
    12·1 answer
  • How can a professional association help you reach your career goals?
    5·1 answer
  • What is one major difference between the roles of film directors and theater directors? A. A theater director is involved in sel
    14·1 answer
  • Find the maximum value and minimum value in milesTracker. Assign the maximum value to maxMiles, and the minimum value to minMile
    10·1 answer
  • Modify class Time2 of fig 8.5, (which is split into four pictures) to include a tick method that increments the time stored in a
    8·1 answer
  • Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!