1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
3 years ago
9

Design a flowchart or pseudocode for a program that accepts three numbers from a user and displays a message if the sum of any t

wo numbers equals the third.
Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
6 0

Answer:

Hi there! Pseudocode is the process of writing out the high-level structure of the program in simple English terms which acts as a blueprint of how the program will work. The pseudocode for this question is written below.

Explanation:

Prompt user for input 1

Validate input 1

Prompt user for input 2

Validate input 2

Prompt user for input 3

Validate input 3

Perform checks:

If  

 1 and 2 equals 3

 Or

 1 and 3 equals 2

 Or

 2 and 3 equals 1

Display message to user

You might be interested in
Write a program in Java programming language to display or calculate “Hello, Daddy and Mum”
olganol [36]

Answer:

class Simple{

public static void main(String args[]){

System.out.println("Hello Daddy and Mum);

}

}

Explanation:

First, we create a class, then a method and then give the Integrated Data Environment (IDE) the command to give out an output that says Hello, Daddy and Mum”

8 0
2 years ago
Jonas is an experienced security professional who recently accepted a position in an organization that uses Check Point firewall
vichka [17]

Answer:

CCSA

Explanation:

CCSA is "Checkpoint Certified Security Administrator". This certification is best suited for Jonas.

8 0
3 years ago
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
3 years ago
Information that's been collected to help solve a problem is called
Butoxors [25]

Answer:

Data is the correct answer

5 0
2 years ago
If you're unsure of what chart to use for a set of data, what feature does Excel include that will help you to decide? A. Sparkl
asambeis [7]
If what I found is correct it would be C, all charts... If not that then it would be B.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Date criteria are automatically enclosed in ____ when entered in a query design.
    11·1 answer
  • Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for
    14·1 answer
  • Hello users !
    10·2 answers
  • 4. How do artistic designing and engineering designing differ? How do they overlap?
    11·1 answer
  • Write a function called countstuff () that takes as a parameter a character array, and returns an int. The prototype must be:
    6·1 answer
  • What will the following code print out: int numbers [] = {99, 87, . 66, 55, 101}; for (int i = 1; i < 4; i++) cout << n
    11·1 answer
  • What Is an Antivirus?
    14·2 answers
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • Please help! I need to submit this quick!
    6·2 answers
  • 1. A _______ causes the computer program to behave in an incorrect or unexpected way.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!