1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ad-work [718]
3 years ago
15

The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio

nF is truedo stepGendwhilea. nestingb. stackingc. posttestd. pretest
Computers and Technology
1 answer:
rewona [7]3 years ago
6 0

Answer:

Option d pretest

Explanation:

Given the pseudocode:

  1. do stepA
  2. do stepB
  3. if conditionC is true
  4. then do stepD
  5. else
  6. do stepE
  7. end if
  8. while conditionF is true
  9. do stepG
  10. end while

The pseudocode above shows that there is a pretest before some codes are executed. For example, line 3 check if condition is true then only execute stepD otherwise execute stepE. Line 8 check if conditionF is true then repeatedly execute stepG. These are examples of pretest a condition will must be met (pretest passed) before a block of codes can be executed. This pretest can be seen in if-else statements and also the while condition.  

You might be interested in
Can someone help me i need to write something for cyber bullying
snow_tiger [21]

cyber bullying is when there is a minor on both ends and when a person has the time to go online to pick on you


3 0
3 years ago
Read 2 more answers
eocs can be fixed locations, temporary facilities, or virtual structures with staff participating remotely.
levacccp [35]

EOCS can be fixed locations, temporary facilities, or virtual structures with staff participating remotely is a true statement.

<h3>What is the Emergency Operations Centers (EOC)?</h3>

Emergency Operations Centers is known to be part of the four NIMS Command and Coordination structures as the EOCs are known to be used  in an off site locations where staff are gotten from a lot of agencies that come together to address some imminent kind of threats and hazards.

Therefore saying that EOCS can be fixed locations, temporary facilities, or virtual structures with staff participating remotely is a true statement.

Learn more about EOCS from

brainly.com/question/10794095

#SPJ1

5 0
2 years ago
This program will convert a set of temperatures from Fahrenheit to Celsius and Kelvin. Your program will be reading in three dou
Naily [24]

Answer:

see explaination

Explanation:

#include<iostream>

#include<iomanip>

using namespace std;

int main()

{

double temp1,temp2,inc,cel;

int i=1;

while(i==1)

{

i=0;

cin>>temp1>>temp2>>inc;

if(temp2<temp1||inc<=0)

{

i=1;

cout<<"Starting temperature must be <= ending temperature and increment must be >0.0\n";

}

}

cout<<endl;

cout<<setw(15)<<"Fahrenheit"<<setw(15)<<"Celsius";

while(temp1<=temp2)

{

cel=(temp1-32)/1.8;

cout<<endl;

cout<<fixed<<setprecision(3)<<setw(15)<<temp1<<setw(15)<<cel;

temp1+=inc;

}

}

Please kindly check attachment for output.

8 0
3 years ago
What are the different types of computer operating systems?
MissTica

Answer:Apple iOS. Apple's iOS is a popular operating system for smartphones. ...

Microsoft Windows. ...

Apple MAC OS. ...

Linux Operating System. ...

Real-Time Operating System. ...

Normal Operating System.

Explanation:

3 0
2 years ago
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Other questions:
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • Businesses have taken advantage of many of the smart phone features to promote their business. TRUE OR FALSE
    5·2 answers
  • Help !!!!!
    9·1 answer
  • What can search the Internet and select elements based on important words?
    6·2 answers
  • When a compiler finds errors, it usually indicates what they are so you can correct the code and compile the program again?
    11·1 answer
  • 1- Which of the following is the java keyword used to declare a class?
    5·2 answers
  • What do you need for digital photography? 1. 2. 3.
    13·1 answer
  • 30 POINTS PLS HELP AND DONT PUT ANYTHING IF U DK PLS
    5·1 answer
  • (03.05 LC
    14·1 answer
  • Meaning and explanation of fortran​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!