1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivanshal [37]
3 years ago
12

Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author’

s name, the title of the work, and a volume number in the form Volume 9 of 9. For example, a set of three volumes requires three labels: Volume 1 of 3, Volume 2 of 3, and Volume 3 of 3. Design a program that reads records that contain an author’s name, the title of the work, and the number of volumes. The application must read the records until eof is encountered and produce enough labels for each work. Pseudocode and flowchart required.

Computers and Technology
1 answer:
tigry1 [53]3 years ago
8 0

Answer:

The answer to this question can be described as follows:

Explanation:

The Pseudocode to this question can be described as follows:

start  \\ start process

Declaration of variable

Input_File records.txt

Output_File result.txt

string author_Name , title

int number_of_volume

open Input_File

open Output_File

input author_Name, title, number_of_volume from records.txt

while not eof \\ start loop and eof is end of file  

output author_Name

output title

output number_of_volume

end while  \\end loop

close records.txt  \\close file

close results.txt   \\close file

END \\end the code

You might be interested in
1. What are the advantages and disadvantages of the digital darkroom as compared to a regular
ki77a [65]

Answer:

The advantages of a digital darkroom is that it allows the photographer to make minor changes to improve a photograph. The disadvantage is that the more you want your picture to come out better you would need to waste your time or be patient to get the picture and buy a better camera.

4 0
3 years ago
Which of the following sets of values constitutes a valid RSA public key encryption system?
Gelneren [198K]

Answer:

oh I can't it looks so confusing

6 0
3 years ago
Your company leases a very fast internet connection and pays for it based on usage. You have been asked by the company president
azamat

Answer:

c. Install a proxy server

Explanation:

In computing a proxy server is implemented as a middle 'man' between the user and the internet. It will hence behave as a gateway that will seperate users from the websites that they browse. The major importance of a proxy server is enforcing security, however it can also act as a web filter allowing organizations to restrict access to certain websites. So when an organization or a school wishes to prevent access to certain sites a proxy server will be implemented, in the question scenario this web filter feature can be used to save cost associated with visiting sites not relevant to the organization's objectives

7 0
3 years ago
Clara made ice-cream by mixing 200 g of strawberry juice with 500 g of cream. What is most likely the mass of the ice-cream form
Ronch [10]

700 g, mass of ingredients are added in this chemical change

7 0
3 years ago
Specify either "Write Through" or "Write Back" as the policy which best corresponds to each of the conditions below.
Mariulka [41]

Answer:

1. Write through

2. Write back

3. Write back

4. Write through.

Explanation:

The answers are given accordingly as above.

4 0
3 years ago
Other questions:
  • If x is an int, which of the following statements adds 5 to the current value of x and stores the new value back in x?
    12·1 answer
  • Which term refers to the technical structure of the software, how users interact with the software, and how the software is phys
    10·1 answer
  • Which of the following is NOT true of constructors? Question 6 options
    14·1 answer
  • Which of the following is not an Operating System? Select one:
    13·1 answer
  • Write a program that include a method that returns the sum of all the elements of a Linked List of Integers. Allow the user to e
    11·1 answer
  • Why can videos be streamed from the cloud to a computer with no loss in
    5·2 answers
  • MODS ONLY answer this, I have something for you. I'm reporting this to make it easier
    14·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
  • Wht is RAM called Random Access memory and ROM IS called Read only memory​
    9·1 answer
  • Given a number n, for each integer i in the range from 1 to n inclusive, print one value per line as follows:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!