1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivanshal [37]
3 years ago
12

Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author’

s name, the title of the work, and a volume number in the form Volume 9 of 9. For example, a set of three volumes requires three labels: Volume 1 of 3, Volume 2 of 3, and Volume 3 of 3. Design a program that reads records that contain an author’s name, the title of the work, and the number of volumes. The application must read the records until eof is encountered and produce enough labels for each work. Pseudocode and flowchart required.

Computers and Technology
1 answer:
tigry1 [53]3 years ago
8 0

Answer:

The answer to this question can be described as follows:

Explanation:

The Pseudocode to this question can be described as follows:

start  \\ start process

Declaration of variable

Input_File records.txt

Output_File result.txt

string author_Name , title

int number_of_volume

open Input_File

open Output_File

input author_Name, title, number_of_volume from records.txt

while not eof \\ start loop and eof is end of file  

output author_Name

output title

output number_of_volume

end while  \\end loop

close records.txt  \\close file

close results.txt   \\close file

END \\end the code

You might be interested in
You manage a small LAN for a branch office. The branch office has three file servers and few client workstations. You want to us
lana66690 [7]

You manage small LAN for a branch office. The branch office has three file servers and few client workstations. You want to use Ethernet device and offer guaranteed bandwidth to each server. You design the network by <u>connecting all network devices to a switch. Connect each server to its own switch port.</u>

<u></u>

Explanation:

  • A local-area network (LAN) is a computer network that spans a relatively small area.
  • Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
  • The LAN is the networking infrastructure that provides access to network communication services and resources for end users and devices spread over a single floor or building.
  • Designing a LAN for the campus use case is not a one-design-fits-all proposition.
  • If there is a single 48-port switch, 47 devices can be supported, with only one port used to connect the switch to the rest of the network, and only one power outlet needed to accommodate the single switch

8 0
3 years ago
An understanding of basic psychology can help design and marketing teams ensure they meet their intended audience.
Kamila [148]

Answer:

um true i think cause to understand something or someone you have to help it to find it place in the world by make design for them and have a team to help you so they can that there audience if that help you plz mark me brainliest if not then you don't have to

Explanation:

5 0
3 years ago
Read 2 more answers
A(n)<br> is a fast compute with lots of storage. pls help
Pachacha [2.7K]

Answer:

Surface Laptop 3 - 15", Platinum (metal), AMD Ryzen 5 3580U, 8GB, 128GB

4 0
3 years ago
Read 2 more answers
How can i repair computer processor?
Lisa [10]
Short answer, you don't. Modern Processors are made up of billions of transistors and are built in multi million dollar factories that have equipment just for that purpose.
8 0
3 years ago
What are some options available when inserting an address block? Check all that apply. previewing postal code full address label
iVinArrow [24]

Answer:

A. previewing

B. postal code

C. full address

E. matching fields

F. company name

7 0
3 years ago
Read 2 more answers
Other questions:
  • Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being
    14·1 answer
  • "The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
    11·1 answer
  • A virus or worm can have a payload that installs a(n) __________ door or trap-door component in a system, which allows the attac
    14·2 answers
  • What term is defined as private data placed in a packet with a header containing routing information that allows the data to tra
    13·1 answer
  • What linux command is used to change file permissions?
    10·1 answer
  • Apakah ada yang bisa menjelaskan potongan source code ini?
    15·1 answer
  • Adobe reader is a type of​
    14·2 answers
  • If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
    8·1 answer
  • Is it better to try to prevent damage from natural disasters or to deal with disasters after they occur?
    10·2 answers
  • 75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks aro
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!