1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
2 years ago
5

Write an alogorithm and draw the Flow Chart to

Computers and Technology
1 answer:
svp [43]2 years ago
7 0

In computer programs, algorithms and flowcharts are used as prototypes of an actual program

<h3>The algorithm</h3>

The algorithm of the program is as follows:

  • Input a, b, c
  • Calculate d using d = b*b - 4 * a * c
  • If d < 0, print "Complex roots"
  • Else
  • Calculate x₁ using x₁ = (-b + sqrt(d))/4 * a * c)
  • Calculate x₂ using x₂ = (-b - sqrt(d))/4 * a * c)
  • Print x₁ and x₂
  • End

<h3>The flowchart</h3>

This is always in represented using a diagram

See attachment for the flowchart.

Read more about flowchart and algorithms at:

brainly.com/question/16763367

#SPJ1

You might be interested in
What is the definition of the word uproot?
avanturin [10]
Uproot means to pull something out of the ground, when a tree is uprooted, It is pulled out of the ground
4 0
3 years ago
What problems do you see in the process of transacting business online
allsm [11]

Lack of Computer Expertise. ...

Difficulty Developing Relationships. ...

Privacy and Security Concerns. ...

Issues With Copyrights. ...

Limitations of Business Types.

4 0
3 years ago
True or False (type the entire word)
kozerog [31]

Answer:

True.

Explanation:

(Facts from Google): The answer is true because small data is defined as data that is small enough for human comprehension. Big data is data that comes in large chunks and is too large for traditional data processing. Small data is most likely all about finding the causation because it is understandable, and therefore can be read.

5 0
3 years ago
Your task is to create a bash shell script that is able to backup all the C++ program files in your current directory. The algor
Oliga [24]

Answer:

backup() {

 read dirname;

 if [[ whereis . /`$dirname` 2>  sterr.exe]]  

    then

        mkdir  $dirname

 for f in . / *.cpp

 do

    cp f "path_to_dirname"

    echo "file backup complete"

}

backup( )

Explanation:

The bash script above is used to backup C++ source files in a directory to a backup directory which is created if it does not exist, and copy's each .cpp file to backup, then sends a message to declare its completion.

7 0
4 years ago
PLEASE HELP!! Computer science test
tatiyna

Answer:

See Explanation

Explanation:

Given

The attached function

What the recursion does is that; it adds up individual digits from N to 0

Solving (a): Each output when N = 6

For N = 6.

The function returns the following values:

f(6) = 6

Then: 6 + f(5)

Then: 6 + 5 + f(4)

Then: 6 + 5 + 4 + f(3)

Then: 6 + 5 + 4 + 3 + f(2)

Then: 6 + 5 + 4 + 3 + 2 + f(1)

Then: 6 + 5 + 4 + 3 + 2 + 1 + f(0)

Then: 6 + 5 + 4 + 3 + 2 + 1 + 0 = 21

Solving (b): The output when N = 7

Using the same process in (a) above.

The output is 28

6 0
3 years ago
Other questions:
  • Define the method object inc_num_kids() for personinfo. inc_num_kids increments the member data num_kids. sample output for the
    11·1 answer
  • 2. a. Write pseudocode for a divide-and-conquer algorithm for finding valuesof both the largest and smallest elements in an arra
    11·1 answer
  • Write a program that prints the day number of the year, given the date in the form month-day-year. For example, if the input is
    9·1 answer
  • The three tasks within data harmonization, namely: data consolidation, data cleansing, and data formatting use techniques called
    8·1 answer
  • The ______ printers are the most popular type of printer in small office/home office and large office environments.
    5·1 answer
  • In the list [0, 13, 5.4, "integer"], which element is at index 2?
    11·1 answer
  • Wanna song to vibe to? Listen to Streets by Doja cat
    11·1 answer
  • The cat store needs your help! The base class Animal has private fields animalName, and animalAge. The derived class Cat extends
    9·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Identifying correction services tasks
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!