1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
2 years ago
13

write pseudocode to represent the logic of a program that allows the user to enter two values. The program outputs the sum of an

d the difference between the two values.
Computers and Technology
1 answer:
valkas [14]2 years ago
4 0

The pseudocode representing the above described logic of a program is:

start

input num1

input  num2

set product  =  num1*num2

output product

stop

See the related flow chart is attached.

<h3>What is a pseudocode?</h3>

Pseudocode is a precise yet comprehensible explanation of what a computer program or algorithm must perform, written in normal language rather than programming language.

Pseudocode is occasionally used as a detailed phase in the development of a program.

Learn more about Pseudocode:
brainly.com/question/24953880
#SPJ1

You might be interested in
You want to be able to access your home computer using remote desktop while traveling. you enable remote desktop, but you find t
solong [7]
Get a program for this perpose or perhaps get a new computer
5 0
3 years ago
Read 2 more answers
A program that will accept the ages of girls and boys and calculate the total and average age​
Firdavs [7]

Answer:..

hmmm...... i dont any programs that can do that

8 0
3 years ago
What is y +5=7(x-8) written in standard​
OLga [1]

The answer is:

7x-y=61

3 0
3 years ago
Please what's the answer to this
timofeeve [1]
The answer is the 2nd one. Hope this helps! ;)
8 0
3 years ago
Many homeowners find it convenient to use interconnected electronic devices controlled through a computer or smartphone connecte
kkurt [141]

Answer:

The most probable negative impact that IoT devices can have on users is the increase vulnerability of information technology cybersecurity, being that access can be gained into the system through another device connected to an IoT device from which it is theoretically possible to launch malicious computer codes, using both old and present day hacking technologies, due to the different securities, categories and systems of devices connected to the IoT

Explanation:

The negative impacts of Internet of Things IoT devices on users are

1) Loss of privacy 2) Network complexity increase 3) Increase in the dependence on technology 4) Increased unemployment, 5) Lack of compatibility between devices

5 0
3 years ago
Other questions:
  • You can type notes of what to cover when presenting the show in the______ pane.
    15·1 answer
  • In how many ways can the letters of the word APPROXIMATION be arranged?
    12·1 answer
  • What is the output of intb= 4+ 6 /2 Systemoutprintln (b)
    5·1 answer
  • Kyle wants to access his school’s home page. How can he do this?
    8·2 answers
  • Do people answer questions more on this site or be on social more ??? no right or wrong answer your opinion
    6·1 answer
  • Which of these files, when included in a program, will provide user assistance?
    5·2 answers
  • Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what a
    14·1 answer
  • A financially stable person is able to:
    8·1 answer
  • (iii) ............ characters can be stored in memo field. (a) 50 (b) 64000 (c) 255 (d) 200 ​
    8·1 answer
  • Differentiate between soft copy output and hard copy output?​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!