1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IrinaK [193]
4 years ago
9

Write down the pseudo code of a program that calculates the Body Mass Index (BMI) of

Computers and Technology
1 answer:
SSSSS [86.1K]4 years ago
8 0

Answer:

A pseudo code was used in calculating the body mass index (BMI) of a person. The code was executed and can be shown on the explanation section below

Explanation:

Solution

#Pseudocode program to calculate the BMI of a person

Input height in meter

Input weight in kg

BMI = Weight / (height)2

If BMI < 18.5 then

Print output as “Underweight”

ElseIf  BMI >= 18.5 and BMI < 24.9 then

Print output as “Healthy”

ElseIf bmi >= 24.9 and BMI < 30

Print output as “overweight”

Else BMI >=30 then

Print output as “Obesity”

End if

You might be interested in
Mason is part of a project team that is creating a television advertisement. List one risk the team faces and a strategy for min
Andru [333]

One risk might be that they might use copyright music and and the music creator might take legal action.

5 0
4 years ago
A company's loss control department identifies theft as a recurring loss type over the past year. Based on the department's repo
maria [59]

Answer: C) Motion detectors

Explanation:

Motion detectors is the device that is used for detection of moving object in any area. They are used for security purposes by tracking motion or people and alerting the user.It consist of motion sensor for detection of motion and alerting the users or organization about security breach through alarming .

  • According to the question,Chief information officer should implement motion detectors to investigate about theft that takes place in company's department on regular basis.Any intervention for company's loss will be alerted through tracking motion of the thief.
  • Other options are incorrect because camera is used for recording videos and images. Bio-metric device is used for digital identification of any person to enter into a system. Man-trap is vestibule used for controlling access of a person for security.
  • Thus, the correct option is option(C).
6 0
3 years ago
Before you start creating a database, you should first use paper to plan, test, and revise. True False
Licemer1 [7]
<span>Before you start creating a database, you should first use paper to plan, test, and revise. True or False?
TRUE</span>
8 0
4 years ago
Read 2 more answers
For the MIPS assembly instructions below, what is the corresponding C statement? Assume that the variables f, g, h, i, and j are
Sauron [17]

Answer:

lw $t0, 16($s7) // $t0 = B[4]

lw $t1, 12($s7) // $t1 = B[3]

sub $t0, $t0, $t1 // $t0 = B[4] – B[3]

sll $t0, $t0, 2 // $t0 = $t0 * 4

add $t0, $t0, $s6 // $t0 = &A[B[4] – B[3]]

lw $t1, 0($t0) // $t1 = A[B[4] – B[3]]

add $s0, $s1, $t1 // f = g + A[B[4] – B[3]

Explanation:

lw $t0, 16($s7) // $t0 = B[4]

lw $t1, 12($s7) // $t1 = B[3]

sub $t0, $t0, $t1 // $t0 = B[4] – B[3]

sll $t0, $t0, 2 // $t0 = $t0 * 4

add $t0, $t0, $s6 // $t0 = &A[B[4] – B[3]]

lw $t1, 0($t0) // $t1 = A[B[4] – B[3]]

add $s0, $s1, $t1 // f = g + A[B[4] – B[3]

6 0
3 years ago
Read 2 more answers
Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and det
Marrrta [24]

Answer: Option B. System logs

Explanation:

A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Operating systems are designed to work with specific hardware. Which operating system works with Apple computers?
    8·2 answers
  • What is a independent variable
    11·1 answer
  • A word that has a specific, predefined meaning in a programming language is called
    8·1 answer
  • How many bytes are in 1 kilobyte of storage
    13·1 answer
  • Which of these is one of the primary concerns for protecting your family when online?
    9·2 answers
  • When using linear or reciprocal navigation, what should be the interface include?
    15·1 answer
  • Where is 5G being used and how fast is it?​
    5·2 answers
  • Part 2: Code the Program
    12·1 answer
  • If an if-else statement is true, it will include which kinds of results?
    13·1 answer
  • I need help now with YT
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!