1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
4 years ago
8

Write a pseudocode thats accept and then find out whether the number is divisible by 5 ​

Computers and Technology
1 answer:
meriva4 years ago
3 0

Answer:

input number  

calculate modulus of the number and 5  

compare outcome to 0  

if 0 then output "divisible by 5"  

else output "not divisible by 5"

Explanation:

The modulo operator is key here. It returns the remainder after integer division. So 8 mod 5 for example is 3, since 5x1+3 = 8. Only if the outcome is 0, you know the number you divided is a multiple of 5.

You might be interested in
Help verify each identity<br><img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bcsc%7D%7Bcot%20%5C%3A%20x%20%20%5C%3A%20%2B%20%20%5C
CaHeK987 [17]

cot x = cos x / sin x

tan x = sin x / cos x

(Find common denominators)

cosx/sinx * cosx/cosx = cos^2x/sinxcosx

sinx/cosx * sinx/sinx = sin^2x/sinxcosx

(Now we can combine them)

csc / (sin^2x+cos^2x / sinxcosx)

(Simplify)

csc*sinx*cosx / sin^2x+cos^2x

sin^2x + cos^2x = 1

csc*sinx*cosx / (1)

csc*sinx*cosx

csc = 1/sinx

1/sinx*sinx = 1

(1)*cosx = cosx


3 0
4 years ago
which two host names follow the guidelines for naming conventions on cisco ios devices? (choose two.)
vlabodo [156]

RM-3-Switch-2A4* and SwBranch799* are the two host names follow the guidelines for naming conventions on cisco ios devices. The correct options are 2 and 3.

<h3>What is a host name?</h3>

A hostname is a label assigned to a computer network connected device that is used to identify the device in various forms of electronic communication, such as the World Wide Web.

Hostnames can be simple single-word or phrase names, or they can be structured.

The two host names, RM-3-Switch-2A4 and SwBranch799, adhere to the guidelines for naming conventions on Cisco iOS devices.

Thus, the correct options are 2 and 3.

For more details regarding host name, visit:

brainly.com/question/13267319

#SPJ1

Your question seems incomplete, the missing part is attached below:

7 0
2 years ago
Question of Computer science​
PtichkaEL [24]

Answer:

a)None

b)All

this is ur answer from my opinion

5 0
3 years ago
When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on th
balu736 [363]

Answer:

Option D: Botnet

is the correct answer.

<h3>When several computers connected to the Internet have been set up to forward spam and sometimes viruses to other computers on the Internet, <u>Botnets </u>are responsible. </h3>

Explanation:

A Botnet can be taken as the combination of two words "robot" and "networks". Botnets are used in depicting the malicious content as the breach the network security. They are used for stealing data by Distributed Denial of Service attack (DDoS) and by sending spam to all other devices connected to a network. All this scheme is managed by the attacker itself.

All other listed options spread malicious data by some other means.

I hope it will help you!

4 0
3 years ago
I need help on this it's not really a subject it's drivers edd
Papessa [141]

WHICH QUESTION DO U NEED HELP WITH

5 0
3 years ago
Other questions:
  • 1. Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
    15·2 answers
  • What hex value is the standard indicator for jpeg graphics files?​?
    6·1 answer
  • A high school student is working as a summer intern at your company. Explain to the intern how viruses, malware, and spam impact
    11·1 answer
  • What is a expansion card for computer?
    5·1 answer
  • By including ______
    15·2 answers
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • What is the best game of 2020 in pc​
    12·2 answers
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • Define each of the following data mining functionalities: characterization, discrimination, association and correlation analysis
    9·1 answer
  • Suppose you are developing a cricket game in which you are asked to enter score of every ball and can score maximum 6 on each ba
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!