1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
12

Write qbasic code for given patternNEPAL. EPA. P​

Computers and Technology
1 answer:
V125BC [204]3 years ago
3 0

Answer:

The program to question as follows:

Program:

PRINT "NEPAL", 'print message

PRINT ".EPA", 'print message

PRINT ".P​", 'print message

Output:

NEPAL  

.EPA  

.P​

Explanation:

In the above Qbasic program code, the three print function will be used to print the given pattern, that can be described as follows:

  • The first time the print function is used, which uses a value, that is "NEPAL" to print its value.
  • In the second time, again this function is used, that prints a value, that is ".EPA".
  • In the last time, the print method accepts a value, which is ".P" to print its value. when the code is executed, it will print the given design.
You might be interested in
The process of providing only the essentials and hiding the details is known as _____. Group of answer choices algorithm abstrac
almond37 [142]
The answer is data structure
8 0
3 years ago
Why aren't my skullcandy bluetooth headphones connecting to my school chromebook if I turned on both the headphones and the blue
ludmilkaskok [199]
The school could have a block on what’s allowed to be connected to the chrome books. If they don’t let you charge your phone on it then you can’t listen to music with it- My experience at least.
4 0
2 years ago
Read 2 more answers
What computer worm was used to sabatoge iran's nuclear program?
Stels [109]
Researches at symantec have uncovered a version of the stuxnet computer virus that was used to attack irans nuclear program in November.
4 0
4 years ago
You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
Kitty [74]

<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>

Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.

It is a security device and purpose to make organization to access or connected to end use of other networks.

Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN

Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers.  Keeping network logs is policy driven. So network administrator keeps logs for no. of days.

Some network administration export log and keep as reference.

4 0
4 years ago
16. The data selected to create a chart must include
Murljashka [212]

Answer:

B.column titles and row labels

8 0
3 years ago
Other questions:
  • 1. _____ can’t be rewritten by the computer in which it’s installed, but it has the advantage of being very _____.
    6·1 answer
  • Describe a time when you influenced someone else’s knowledge around technology, whether it be an app, a new gadget, etc. What di
    14·1 answer
  • How a hard drive works
    8·1 answer
  • Which tag will you use if you want your web page to look the same as your source code?
    11·1 answer
  • Classify the following skills: preparing a presentation, rebuilding a car, and solving equations.
    11·2 answers
  • Which is a popular IRC chat service?
    8·1 answer
  • Which components can be added to a lightning app on custom object (choose 3 answers)A. Visualforce B. Standard Lightning compone
    6·1 answer
  • Sam wants to use the rule of thirds to capture the essence of his image. How will he apply this rule in his image to get a pleas
    6·1 answer
  • PLEASE HELP I WILL GIVE BRAINLIEST!!
    8·1 answer
  • What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!