1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
2 years ago
5

Write an alogorithm and draw the Flow Chart to

Computers and Technology
1 answer:
svp [43]2 years ago
7 0

In computer programs, algorithms and flowcharts are used as prototypes of an actual program

<h3>The algorithm</h3>

The algorithm of the program is as follows:

  • Input a, b, c
  • Calculate d using d = b*b - 4 * a * c
  • If d < 0, print "Complex roots"
  • Else
  • Calculate x₁ using x₁ = (-b + sqrt(d))/4 * a * c)
  • Calculate x₂ using x₂ = (-b - sqrt(d))/4 * a * c)
  • Print x₁ and x₂
  • End

<h3>The flowchart</h3>

This is always in represented using a diagram

See attachment for the flowchart.

Read more about flowchart and algorithms at:

brainly.com/question/16763367

#SPJ1

You might be interested in
You speak to a business owner that is taking in almost $2,000 in revenue each month. The owner still says that they’re having tr
Serga [27]
Let's say for example that the business is taking in $2000 of revenue.  That is the amount that the business collected for it's services - like for fixing the computer.  What if though it costs $500 for the equipment (that's an expense).  Now they only made $1500.  Now the customer complains and says that the computer isn't fixed properly so the company sends out a techie for 2 additional hours.  They need to pay their employee (another expense).  Now the $1500 is down to $1400.  They would have utilities to keep their lights on and insurance and many other expenses.

Your profit looks like this:
Profit = Revenue - Expenses
7 0
3 years ago
What method do phishing and spoofing scammers use
Leya [2.2K]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.

8 0
3 years ago
What is shouting pertaining to the internet
Ludmilka [50]
Hi!

What is considered shouting on the internet is when WHEN YOU TYPE IN ALL CAPS LIKE THIS!!! Doing this seems to make the words appear louder and more prominent. You can also add more emphasis to ALL CAP words by adding ***ASTERISKS***.
8 0
3 years ago
You can add additional design elements to a picture by adding a color background, which is accomplished by using what Paint feat
katrin2010 [14]

Answer:

Fill with Color tool

6 0
3 years ago
Ferestre de navigare
Stells [14]
LOLOLOLOLOLLOLOLOLOLOLOOOLOLOLOOLOLLOLOLOLOLOLO

7 0
3 years ago
Other questions:
  • Which company provides the Loki Wi-Fi mapping service?
    10·1 answer
  • True or False? A supervisory control and data acquisition (SCADA) device is a computer that controls motors, valves, and other d
    13·1 answer
  • A subclass of Value, LargerValue, is defined with a getValue method that returns twice the value of the parent. Which line is th
    13·1 answer
  • What is a boolean in Java
    5·1 answer
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • You attempt to telnet to system 192.168.1.240. You receive the following message: "Connecting To 192.168.1.240...Could not open
    5·1 answer
  • Please Helpppp Me User Interface Design ensures that the interface has elements that are easy to ________________. (Choose all t
    8·1 answer
  • When preparing a technical document, do all of the following EXCEPT:_______.
    12·1 answer
  • How would you write this using Java: Use a TextField's setText method to set value 0 or 1 as a string?
    5·1 answer
  • What ethical concerns might arise from applying new IT to law enforcement?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!