1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
7

If(moreDate == true)

Computers and Technology
1 answer:
worty [1.4K]3 years ago
5 0

it's either C or D I am pretty sure that the answer is D

You might be interested in
Hello can you please help with this if you want to thank you!
nikklg [1K]

Answer:

hardware and software is the answer

8 0
3 years ago
Read 2 more answers
Iii. Write the pseudocode for a program to take two integer inputs and the operator from user and
Katen [24]

Answer:

The pseudocode is as follows:

Input num1, num2

input operator

print num1 + num2

print num1 - num2

print num1 * num2

if num2 != 0

    print num1 / num2

else

    print "Cannot divide by 0"

Explanation:

This gets input for both numbers

Input num1, num2

This gets input for the operator

input operator

This prints the sum

print num1 + num2

This prints the difference

print num1 - num2

This prints the product

print num1 * num2

This prints the division if the divisor is not 0

<em>if num2 != 0</em>

<em>     print num1 / num2</em>

<em>else</em>

<em>     print "Cannot divide by 0"</em>

<em />

6 0
3 years ago
Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following
jok3333 [9.3K]

Answer:

Liam could

1) Change the password

Be sure to change the password to a "strong" one (containing lots of characters, numbers, symbols) so that way the password would be difficult to guess.

2) Avoid logging onto social media on public computers or WiFi connections.

Using public WiFi leaves you vulnerable to someone accessing your information through Internet traffic. If you do use public computers, just make sure to log out.

3) Avoid giving out account information to friends and avoid opening suspicious links and emails.

Opening suspicious links or emails could allow malware to infect your computer the moment you open them. Friends can unknowingly share these links that are designed to steal information.

I hope this helped <3 please lmk if there's anything more to add.

4 0
3 years ago
What's wrong with these codes in code HS Karel challenges(7.1.2. Racing Karel) Codes: //Below is the program that have Karel mov
Viktor [21]

Answer:

The program only runs 5 five since the for loop statement is limited to loop only five times.

Explanation:

In programming, a for-loop statement is used to repeat a collection of events a definite number of times. The number of loops is specified and compared with a variable to execute a block of code.

The for-loop statement in the code above declares and initializes a variable "i" to zero, runs the block of code, and increments by one if it is less than 5.

To make it run eight times, the value five should be changed to 8 instead.

5 0
3 years ago
What is the Full form of DC?
HACTEHA [7]

Answer:

Deputy Commissioner.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Barr the Bear has started a business to sell fish to Poe and his fellow penguins. The penguin customers submit many fish orders,
    12·1 answer
  • Question 13 (6.67 points)
    7·1 answer
  • Under the advanced options screen, what startup option should be enabled in order to view what did and did not load during the b
    12·1 answer
  • Name one advantage of modular switches over fixed-configuration switches.
    5·1 answer
  • Give examples of two IP addresses (that are 100 IP addresses away from each other but the last octet is not greater than .150) t
    15·1 answer
  • Review the section from your textbook related to management information systems (MIS) infrastructures. Determine where each item
    13·1 answer
  • Select the correct statement(s) regarding a Network Access Point (NAP), also known as an Internet Exchange Point (IXP). a. At a
    12·1 answer
  • What data type would you use for a decimal number?* ​
    9·1 answer
  • Which of the following will Excel recognize as a date?
    12·1 answer
  • Which database can be used to find studies related to allied health sciences?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!