1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
9

Convert the following pseudi code to C++ code. BE sure to define the apprpriat evariables.

Computers and Technology
1 answer:
KATRIN_1 [288]3 years ago
8 0

Answer:

Following are the C++ code

int speed=20; //  Store 20 in the speed varaible.

int time=10; //Store 10 in the time variable.

int distance = speed *time; // multiply by speed *time

cout<<distance; // display the value of distance

Explanation:

Following are the program in C++ language :

#include <iostream> // header file

using namespace std; // namespace

int main()

{

   int speed=20; //  Store 20 in the speed varaible.

int time=10; //Store 10 in the time variable.

int distance = speed *time; // multiply by speed *time

cout<<distance; // display the value of distance

   return 0;

}

Output:20

Explanation:

Following are explanation of following code

  • Declared a vaiable of type int called "speed" and store 20 on it.
  • Declared a vaiable of type int called "time" and store 10 on it.
  • multiply by speed into the time and store into the distance variable.
  • finally print the "display" value
You might be interested in
Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents.
Vsevolod [243]
<span>Knowledge can reside in email, voice mail, graphics, and unstructured documents as well as structured documents. 
The answer is a. True 

</span>
6 0
3 years ago
Read 2 more answers
Who will help me with a test on Computer Science plz will help you level up and upvotes!!!!! plzzzzzzzzzzzzzzzzzzz
Diano4ka-milaya [45]
Sure, depends what you need help with!
5 0
3 years ago
Read 2 more answers
Does anyone know how many Brainliests you need to be able to send a private message to someone??
White raven [17]

Answer:

no idea sorry...

Explanation:

8 0
3 years ago
Read 2 more answers
Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
Vlada [557]

Answer:

Rule based Attack.

Explanation:

                    As password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate user. The attacker can use Rule Based Attack to find the password and to intrude or compromise the network and systems.

                    This is like a programming language to generate the password. This involves functions to modify, cut, edit and extend the generally used terms by the user.

5 0
3 years ago
A ____________________ machine is used to gather or arrange in their proper sequence.
Iteru [2.4K]

Answer:

A collating machine is used to gather or arrange in their proper sequence.

Explanation:

4 0
2 years ago
Other questions:
  • âwhat two log files are used by older versions of unix and newer version of linux to store log information
    10·2 answers
  • What does the acronym GIF stand for? Graphics Interface Format Graphics Interchange Format Going Into Files Gathering Informatio
    12·2 answers
  • How can you make a circle in JavaScript? Thank you!
    9·1 answer
  • Your friend sees an error message during Windows startup about a corrupted bootmgr file. He has another computer with a matching
    12·1 answer
  • What type of program would you use to create a personal budget?
    9·1 answer
  • The 2 main types of copyright relevant to the recording industry?
    5·2 answers
  • What does Pentium means?:/
    7·2 answers
  • When you're working on an image, it's a good idea to make a ____________ of the image, so that you'll have the original image in
    12·2 answers
  • _______ is a communications protocol used to send information over the web. HyperText Markup Language (HTML). URL (Uniform Resou
    10·1 answer
  • Where is information stored in the computer?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!