1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
8

Lungi’s risk manager has advised him never to have more than 30 blankets in stock. Q.2.1 Write the pseudocode for two modules wh

ich could be incorporated into the application planned for Lungi in Question 1. The first module must: a. Allow Lungi to enter the description and size of the blankets. b. Store the details entered in arrays. c. Provide Lungi with the option to view the list of blankets captured. If Lungi wishes to view the list of blankets, the contents of the arrays should be passed to another module. The second module should: a. Receive the arrays as arguments. b. Write the contents of the arrays to a text file that Lungi can print.
Computers and Technology
1 answer:
USPshnik [31]3 years ago
6 0

Using the knowledge of pseudocodes it is possible to organize the stock of a store with the correct amount of blankets.

<h3>Writing the code in pseudocode we have:</h3>

<em>int blanket_info(30)</em>

<em>int blanket_disc,size_blanket,i,j;</em>

<em>for (i=0;i<n;i++){</em>

<em>insert the discription of every blanket (blanket_disc);</em>

<em>}</em>

<em>for(j=0;j<n;j++){</em>

<em>insert the size of blanket (size_blanket);</em>

<em>}</em>

<em>return arr [ ][ ];</em>

<em>int print_list()</em>

<em>end;,</em>

See more about pseudocode at brainly.com/question/13208346

#SPJ1

You might be interested in
The first real computer was an abacus?
kotegsom [21]
True, false, false. Hope this helps:)
3 0
3 years ago
What type of encryption is this "1d83ad29cf19ff399445aff3a0da74d9"
bija089 [108]

Due to the length of the hash I'm going to say it's MD5

7 0
3 years ago
A _____ attack floods a network or server with service requests to prevent legitimate users' access to the system. phishing back
Ad libitum [116K]
Denial-of-service is correct 
4 0
3 years ago
What is the difference between HTML and CSS? * 1. CSS is a markup language unlike HTML. 2. HTML is a backend technology and CSS
GarryVolchara [31]
The anserw is the third one. 
5 0
3 years ago
Read 2 more answers
A person appreciation of a food taste and flavor is commonly referred to as what
Nimfa-mama [501]

Answer:

Palate - A person’s appreciation of taste and flavor, especially when sophisticated and discriminating Eclectic - Deriving ideas, style, or taste from a broad and diverse range of sources Piquancy - A pleasantly sharp and appetizing flavor

6 0
3 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • A company is utilizing servers, data storage, data backup, and software development platforms over an Internet connection.
    14·1 answer
  • A personal business letter is a letter that is ____.
    13·1 answer
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    14·1 answer
  • Help me or I'll go insane I've 6x already I'm about to lose it!!!!
    11·2 answers
  • What does XD mean? I keep seeing people say it and I dont know what it means
    6·2 answers
  • Only for study<br><br>Or open Meet and enter this code: bqa-ivfs-ach​
    11·2 answers
  • What are other ways you could use the shake or compass code blocks in physical computing projects?
    14·1 answer
  • Something I should look for when trying to decide if a source is credible is the publication's ....
    10·1 answer
  • The term information technology was first used what year?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!