1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
antoniya [11.8K]
3 years ago
6

Write a fragment of code that will test whether an integer variable score contains a valid test score. Valid test scores are in

the range 0 to 100.
Computers and Technology
1 answer:
Klio2033 [76]3 years ago
5 0

Answer:

Following are the code in the C Programming Language.

//set integer datatype variable

int score;

//check condition is the score is in the range of 0 to 100

if(score > 0 && score < 100){

//print if condition is true

printf("Valid test scores");

}else{

//otherwise print the following string.

printf("test scores are Invalid");

}

Explanation:

<u>Following are the description of the code.</u>

In the following code that is written in the C Programming Language.

  • Set an integer data type variable i.e., score.
  • Then, set the if conditional statement to check the condition is the variable "score" is greater than 0 and less the 100.
  • If the following statement is true then print "Valid test scores".
  • Otherwise, it print "test scores are Invalid".
You might be interested in
What type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends
vaieri [72.5K]

The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

<h3>What is replay attacks in security?</h3>

A replay attack is known to be a kind of security attack that is known to be done if  or when a cybercriminal is said to spy on a secure network communication.

Note that by this, they tend to intercepts the message  and then they can fraudulently delays or as well as resends it to misdirect the receiver into carrying out the thing that  the hacker wants.

Hence, The  type of attack occurs when the threat actor snoops and intercepts the digital data transmitted by the computer and resends that data, impersonating the user is called replay.

learn more about  digital data from

brainly.com/question/28346439

#SPJ1

8 0
2 years ago
Which of these is a type of social engineering attack?
Gnoma [55]

Answer:

phishing

Explanation:

all others are different ways of Hacking.

are you interested in cyber security?

4 0
3 years ago
Will mark brainliest! What does this code do? What kind of code is this called?
gavmur [86]

Answer:

lol u can barly call this a code

Explanation:

its just a type error code i think

3 0
3 years ago
Write a structured algorithm that prompts the
MA_775_DIABLO [31]

Answer:

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

Explanation:

Algorithm is a sequence of instructions a computer is expected to follow to solve a particular problem.

Required :

Two inputs ; num1 and num2

Expected output

Algorithm :

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

The two numbers to multiply are entered ; the product is calculated by the program ; the the user inputs his or her own expecteted product ;

Both are compared and the output of the comparison is displayed (either correct oe incorrect)

8 0
3 years ago
La computadora es un medio de comunicacion moderno?
kolbaska11 [484]
Moderno = mordern, if It does than yes!
3 0
3 years ago
Other questions:
  • Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data
    11·1 answer
  • You use a ____ following the closing brace of an array initialization list.
    12·2 answers
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • #11. Write a program that prompts the user to input a four-digit positive integer. The program then outputs the digits of the nu
    6·1 answer
  • The largest type of computer system with the most extensive storage capacity and the fastest processing speeds is a ________.
    7·1 answer
  • The elements in a long array of integers are roughly sorted in decreasing order. No more than 5 percent of the elements are out
    12·1 answer
  • Question 5(Multiple Choice Worth 5 points)
    10·2 answers
  • Hich of these statements is a value statement?
    14·2 answers
  • Classify computer based on signal
    14·1 answer
  • The equals method of the Object class returns true only if the two objects being compared:_________
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!