1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
1 year ago
12

write pseudo code that will calculate a running sum. a user will enter numbers that will be added to the sum and when a negative

number is encountered, stop adding numbers and write out the final result.
Computers and Technology
1 answer:
never [62]1 year ago
4 0

A running sum of an array is what we refer to as running. The pseudocode in the running total is calculated as [1, 1+2, 1+2+3, 1+2+3+4].

Pseudocode is a technique for describing an algorithm's individual phases in a way that anyone with a rudimentary understanding of programming can comprehend.

Even though pseudocode is a syntax-free description of an algorithm, it must fully describe the logic of the algorithm so that converting each line from pseudocode to code using the syntax of any given programming language is all that is required to complete the implementation process.

Although pseudocode is a syntax-free description of an algorithm, it still needs to accurately capture the logic of the algorithm so that all that is needed to finish the implementation process is to translate each line from pseudocode to code using the syntax of any given programming language.

To know more about pseudocode click here:

brainly.com/question/17442954

#SPJ4

You might be interested in
Which type of protocol allows for a secure data transmission using encryption methods?
oksano4ka [1.4K]

Answer:

The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection

5 0
3 years ago
100 students were asked to fill out a form with three survey questions, as follows: H: Honor Roll C: Club membership (Robotics C
finlep [7]

Answer:

1. 45

2. 9

3. 11

4. 17

Explanation:

Given  the following:

28 checked H

26 checked C

14 checked D

8 checked H and C

4 checked H and D

3 checked C and D

2 checked all.

Hence N(H) = 28

N(C) = 26

N(D) = 14

N(H U C) = 8

N(H U D) = 4

N(C U D) = 3

N(H U C U D) = 2

We also know that

Total = N(H) + N(C) + N(D) - N(H U C) - N(H U D) - N(C U D) + N(H U C U D)

Substituting the given values, we obtain

Total = 55

1. Students that didn't check any box = 100 - 55 = 45 students

2.  Students who checked exactly two box

=  N(H U C)  + N(H U D) + N(C U D) - 3N(H U C U D) (from probability theorem)

Substituting the values, we have 8 + 4 + 3 - 6 = 9 students

3. Students who checked atleast two box =

The people who have checked all three are needed to be calculated once. Earlier, we subtracted them thrice so we add one time

 N(H U C)  + N(H U D) + N(C U D) - 2N(H U C U D) = 8 + 4 + 3 - 4 = 11 students

4.  Given N(C) = 26

We subtract N(CUD) and N(HUC) as they have checked another apart from club.

 26 -8 - 3 = 15

Now we could notice we have subtracted N(HUCUD) twice in both categories, so we add one time to neutralise

15 + 2 = 17

Hence N(only C) = 17 students.

7 0
4 years ago
1. Bones do not change position when the muscles contract and release.
DochEvi [55]
TrueBones do not change position
6 0
4 years ago
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the contro
valina [46]
Risk assessment is the answer.
8 0
3 years ago
State three reasons why users attach speakers to their computer​
____ [38]

Answer:

For listening sake

To listen to information from the computer

They receive audio input from the computer's sound card and produce audio output in the form of sound waves.

8 0
3 years ago
Other questions:
  • Write a literal representing the false value in c++.
    11·1 answer
  • What is <html>
    9·2 answers
  • What does nntp stand for?
    12·2 answers
  • One of the difficult decisions a systems analyst has to make when it comes to software is whether to recommend making, buying, o
    13·1 answer
  • Andrew works for a company that develops for a company that develops optic-fiber cables for transmission of data. which layer of
    14·1 answer
  • A new systems development project is Pete’s first experience as a project manager, and he has led his team successfully to the p
    13·1 answer
  • How can computational thinking techniques be applied to software development
    6·1 answer
  • PLEASE HELP ILL GIVE BRAINIEST
    6·2 answers
  • Python 3.12 LAB: Input and formatted output: Right-facing arrow Given input characters for an arrowhead and arrow body, print a
    15·1 answer
  • What is it called when a programmer includes a step in an algorithm that lets
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!