1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
7

Research current rates of monetary exchange. Draw a flowchart or write pseudocode to represent the logic of a program that allow

s the user to enter a number of dollars and convert it to Euros and Japanese yen.
Computers and Technology
1 answer:
Anastasy [175]3 years ago
7 0

Explanation:

Start

Input dollars

Set Euros = 0.91 * dollars

Set Yens = 109.82 * dollars

Output Euros

Output Yens

Stop

Note: The rates are as of 07-Feb-2020

You might be interested in
You are troubleshooting a problem with a laser printer where several pages of random dots are produced when you try to print a o
yawa3891 [41]

Answer: Formatter Board

Explanation: Formatter board is the component present in the laser printers that helps in receiving the print data from computer and then organizing so that it can be converted into the image .

The image then get transferred into the controls the electrical and mechanical elements of the printer.So, the issue might have occurred in the formatter board that is causing to print several dots randomly while printing a single page

4 0
3 years ago
software that instructs the computer how to run applications and controls the display/keyboard is known as the what?
Tomtit [17]
<span>The software that instructs the computer how to run applications and controls the display /keyboard is known as DRIVERS software, A driver is a software program that enables a specific hardware device to work with a computers operating system. Drivers may be required for internal components such as video cards and optical media drives.</span>
7 0
3 years ago
What are some principles of Programming?​
adelina 88 [10]

Answer:

1: Don't repeat yourself (DRY).

2: Keep it simple (KISS)

3. Minimize Coupling

4. Maximize Cohesion

5. Hide Implementation Details

6. Law of Demeter

7: Open/Closed Principle

Explanation:

1. Avoiding repetition is probably the single most fundamental tenet in programming.

2. Simplicity should always be a key goal. Simple code takes less time to write, has fewer bugs, and is easier to modify.

3. Any section of code (code block, function, class, etc.) should minimize the dependencies on other areas of code. This is achieved by using shared variables as little as possible.

4. Code that has similar functionality should be found within the same component.

5. Hiding implementation details allows change to the implementation of a code component while minimally affecting any other modules that use the component.

6. Code components should only communicate with their direct relations (e.g. classes that they inherit from, objects that they contain, objects passed by argument, etc.)

7. Software entities (classes, modules, functions, etc.) should be open for extension, but closed for modification. In other words, it is not recommended to write classes that people can modify, write classes that people can extend.

I hope this helps and I'm sorry if it doesn't.

Have a great day! :)

8 0
3 years ago
What was the main purpose of napiers bone?​
poizon [28]

Answer:

Napier's bones is a manually-operated calculating device created by John Napier of Merchiston, Scotland for the calculation of products and quotients of numbers. The method was based on lattice multiplication, and also called 'rabdology', a word invented by Napier.

6 0
3 years ago
Read 2 more answers
Cisco Next Generation Intrusion Prevention System (NGIPS) devices include global correlation capabilities that utilize real-worl
madreJ [45]

To configure and set up Sourcefire NGIPS–managed devices, you must define blocking rules, set up the IPS to capture traffic, and, if necessary, block untrusted IP addresses. Sourcefire NGIPS is widely deployed in many enterprise environments that help protect the perimeter from intrusions.

Review the Sourcefire Installation Guides to set up a Defense Center and managed devices. The appliance will be configured as a Next Generation firewall.

Log in to the Sourcefire management interface and select the device you have configured.

Sourcefire NGIPS Interfaces Tab

Enter the specific details within the Device section. Click the pencil icon to edit the device-specific details.

Sourcefire Managed Device Setup

We have two separate security zones created on this device: the BIG-IP load balanced security zone, which is the zone for all the IPS-managed device interfaces, and the VLAN-35 security zone, which is the network for all the application server nodes (i.e., FTP, HTTPS, WEB). The Sourcefire NGIPS– managed device will inspect network flows coming from the BIG-IP appliance and then connect to the back-end server pools.

8 0
4 years ago
Other questions:
  • Why is it important to have regular maintenance and care of your office equipment?
    5·1 answer
  • Describe the 3 parts of a spreadsheet formula
    12·1 answer
  • Difference between video game laser and projectile
    9·1 answer
  • The three devices you are going to install are a 2u server, a 1u keyboard tray, and an 8u space for a rack mounted moitor. Given
    6·1 answer
  • Universal Container sales reps can modify fields on an opportunity until it is closed. Only the sales operations team can modify
    13·1 answer
  • HI PLZ HELP 11 POINTS!!!
    12·2 answers
  • As a student, why do you need to know and follow the steps printing a <br><br>document?​
    6·2 answers
  • Find the cost of 2m 20cm at 25p per metre​
    6·1 answer
  • What are the two main parts to a VR experience.
    12·1 answer
  • Which statements are true regarding mainframe computers? Mainframes are fast-performing computers that have large storage capaci
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!