1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
4 years ago
9

CLS

Computers and Technology
1 answer:
Ainat [17]4 years ago
5 0

Answer:

INPUT "Enter your marks in computer"<u><em>;</em></u>CS

<u><em>IF</em></u> C>40 THEN

PRINT "You are passed. <u><em>"</em></u>

ELSE

PRINT "You are failed."

END <u><em>IF</em></u>

Explanation:

see corrections above.

You might be interested in
Which of these is a way of making applications less vulnerable to hacking?
Alecsey [184]
(First one )
---------------------
7 0
3 years ago
Read 2 more answers
Play-e-ball, a company that creates games for gaming consoles, gathers data from the information systems of its partners, suppli
ad-work [718]

Answer:

Option B

Explanation:

It is the perfect example of BI(Business Intelligence).

7 0
3 years ago
How do you flatten a 2D array to become a 1D array in Java?
Leni [432]

Answer:

With Guava, you can use either

int[] all = Ints.concat(originalArray);

or

int[] all = Ints.concat(a, b, c);

Explanation:

Use GUAVA

4 0
2 years ago
The first row of a table is often called the _____ row.
satela [25.4K]

ANSWER:

The first row of a table is often called the header row.

~batmans wife

7 0
3 years ago
Read 2 more answers
What is the name for unwanted software that installs you to click some links?
Natali5045456 [20]

the answer is malware

7 0
3 years ago
Read 2 more answers
Other questions:
  • A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the
    14·2 answers
  • create a 3 to 5 step plan for checking out a post on social media for the next time you encounter something questionable.
    11·2 answers
  • A collection of methods that can be used by any class, as long as the class provides a definition to override the collection's a
    5·1 answer
  • Middleware is software used to: a. connect processes running on different computer systems across a network. b. integrate a comp
    8·1 answer
  • What is the most likely result of a correctly installed processor, but an incorrectly installed cooler?
    6·1 answer
  • I need help with computer science<br> the quiz on e2020 is on hackers and unauthorized access
    15·2 answers
  • Write a function that accepts a cell array StudentScores consisting of the following:
    12·1 answer
  • The format that you will use on your works cited page when the entry is longer than one line is__________.
    5·1 answer
  • While operating a vehicle on any highway of this state, it it illegal to physically hold or support a wireless device with any p
    8·1 answer
  • What type of os must be installed on your machine to allow this type of action by another person?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!