1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
evablogger [386]
2 years ago
11

Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.

Computers and Technology
1 answer:
Svetllana [295]2 years ago
4 0

integer userInput

integer i

integer mid

integer array(20) number

userInput = 1

for i = 0; userInput >= 0; i = i + 1

  if number[i] > -1

     userInput = Get next input

     number[i] = userInput

i = i - 1

mid = i / 2

if i > 9

  Put "Too many inputs" to output

elseif i % 2 == 0

  Put number[mid - 1] to output

else

  Put number[mid] to output

You might be interested in
What is your perception of what a safe classroom looks like
Andreyy89

Answer:

6 feet apart

Explanation:

6 0
3 years ago
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have b
PilotLPTM [1.2K]

Complete Question:

Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?

a) Bastion Host

b) Screened subnet

c) Screened host

d)  Screened

Answer:

b) Screened subnet

Explanation:

In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.

Screened subnet firewall architecture is designed to host servers that offer public services.

In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.

<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>

1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.

2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.

3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.

<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>

8 0
4 years ago
Long distances are usually measured in kilometers.<br> T or F?
timama [110]
Depending where you are in the world it is true and false
7 0
3 years ago
Presentation software allows users to _____.
svlad2 [7]

Answer: technolyy is a graphic igneger that allows itenas to go throught...

8 0
3 years ago
Read 2 more answers
How does critical thinking relates to peer assessment?
Dovator [93]

Answer:

Peer review is a critical component of the life of the mind and an effective teaching strategy for nurturing students' critical thinking skills. ... peer review of writing is most effective when students have an opportunity to revise their writings prior to submitting a grade. Is it true that peer assessment helps students develop their critical thinking skills?

The students' perceptions of the peer evaluation activity were later elicited in interviews and a short written survey. The findings of the study indicate that peer evaluation activities did help in developing critical thinking skills, thus improving their academic writing performance.

Explanation:

8 0
2 years ago
Other questions:
  • Buildings must be wired to comply with the latest National Electrical Code to ensure that, with adequate maintenance, the instal
    11·1 answer
  • What tool enables you to easily delete, add, or resize filesystems without regard to their physical locations on a hard disk?
    13·1 answer
  • Which of these is a subdirectory? <br> HTTPS <br> /FAQ <br> .org <br> WWW
    15·1 answer
  • PLEASE HELP ASAP!!! 99 POINTS FOR 3 MULTIPLE CHOICE QUESTIONS!!! PLEASE ANSWER ALL!!!
    8·1 answer
  • What does a file association specify?
    10·2 answers
  • Professional communication must be objective,
    8·1 answer
  • What could happen if I break copyright law in the future​
    14·2 answers
  • Which of the following are safety guidelines when socializing online?
    14·1 answer
  • Question 2 of 25
    11·1 answer
  • What are the small squares that appear in the corners and in the middle of the sides of a selected object's border called?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!