1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
3 years ago
5

// This pseudocode is intended to determine whether students have

Computers and Technology
1 answer:
Gre4nikov [31]3 years ago
6 0

Answer:

I guess you are asking for problems in this psuedocode.

- Your 'end if' statement is incomplete. It should be something like 'endif firstTest = 0' .

- Rest of the code seems fine.

You might be interested in
Columns are most useful for which tasks ?
amid [387]
Laying out newsletters and creating a visual appeal without images
5 0
3 years ago
What wireless channel should I use?
pav-90 [236]
When looking at wireless channels, there are a couple of variables to keep in mind:
The number of other networks using what channels
The strength of the other networks on other channels

So generally speaking, channels 1, 6, and 11 are used by default. The reason for this is because there isn't any adjacent channel interference when you have all of your networks spread out in that manner. If for example, a network was using channel 3, that network would interfere with the signals one channel 1 and 6, and the bandwidth of those channels would have to be shared amongst all of those networks. This isn't optimal. Ideally you should look for a channel with less hosts who have weak signals. I know that in my area, channel 11 is the best channel to be on, because the hosts using that channel have weak signal strengths, which results in a lesser chance of those signals interfering with mine.
4 0
3 years ago
Read 2 more answers
What countermeasures would you recommend to defend against routing attacks?
Alla [95]

Answer:

 The countermeasure is basically recommended against the attackers for defending various routing attacks. Routing is one of the most generally assaulted segments in a system and a lot of system the executives work centers around checking conduct of switches.

The single router has more than one unit for bundle handling. This encourages quicker handling. This preparing unit is finished programming which can be undermined by an aggressor.

So an additional free equipment is implanted into the switch which can do observing to recognize the product assaults. Maintain a strategic distance from over composition the addresses.

Be movement at time when all of a sudden if anything incorrectly happens we should be in a situation to deal with and deal with the issue since it causes more harm when time runs.

3 0
3 years ago
Which of the following<br> Services are<br> functions performed<br> by the general office?
GaryK [48]

Answer:

comment the choices please

6 0
2 years ago
Write a program that displays, 10 numbers per line, all the numbers from 100 to 200 that are divisible by 5 or 6, but not both.
FromTheMoon [43]

Answer & Explanation:

To print 10 on a line and each number separated by space; you make the following modifications.

print(str(i)+" ",end=' ')

str(i)-> represents the actual number to be printed

" "-> puts a space after the number is printed

end = ' ' -> allows printing to continue on the same line

if(count == 10):

     print(' ')

The above line checks if count variable is 10;

If yes, a blank is printed which allows printing to start on a new line;

The modified code is as follows (Also, see attachment for proper indentation)

count = 0

for i in range(100,201):

     if(i%6 == 0 and i%5!=0) or (i%5 ==0 and i%6!=0):

           print(str(i)+" ",end=' ')

           count = count + 1

           if(count == 10):

                 print(' ')

                 count = 0

7 0
4 years ago
Other questions:
  • You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
    14·1 answer
  • A call center company wants to implement a domain policy primarily for its shift workers. The call center has large groups with
    11·1 answer
  • The appropriate length for an e-mail is about half the amount of text that will fit on an 8 1/2' by 11' page.
    11·2 answers
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • Which device uses radio waves? ceiling fan microwave oven air conditioner x-ray machine?
    7·1 answer
  • Match each label to the correct location on the image match the process to its characteristics
    14·1 answer
  • Hey i need some help with code.org practice. I was doing a code for finding the mean median and range. the code is supposed to b
    14·1 answer
  • Revisa un manual o instructivo de las maquinas o aparatos tecnologicos que tengas en tu casa. Luego, trata de encontrar algunas
    9·1 answer
  • PLS HELP I WILL GIVE BRAINLY<br><br> how does gg docs show the benefits of Cloud computing?
    13·1 answer
  • Please help! Python programming, use the factorial operation to evaluate 4!. Answers are in picture please pick one, thank you.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!