1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
8

Write pseudocode to represent the logic of a program that allows a user to enter three values then outputs the product of the th

ree values. (If you're not sure of the definition of product be sure to look it up to verify its meaning.)
Computers and Technology
1 answer:
Archy [21]3 years ago
3 0

Answer:

Following are the pseudocode  which is given below:

Explanation:

Step 1: Read the three input variable a,b,c by the user.

Step 2:Declared another variable called "product" which is used for storing the result the product of the three values.

Step 3:Perform operation [product=a*b*c] means to multiply a * b *  c and stored in the product.

Step 4: print product.

You might be interested in
Which programming element is used by a game program to track and display score information
laiz [17]
I think the answer is variables.
4 0
3 years ago
Read 2 more answers
2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
avanturin [10]

Answer:

A. Spoofing

Explanation:

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

IP spoofing involves an attacker trying to gain unauthorised access to a system by sending messages with a fake or "spoofed" IP address to make it look like the message came from a trusted source, such as one on the same internal computer network, for example.

Email spoofing often involves things like requests for personal data or financial transactions. The emails appear to be from trusted senders such as customers, coworkers, or managers but they are actually from cyber criminals who deliberately disguise themselves to gain your trust and your help with the action they want you to take

7 0
3 years ago
Suppose that the tuition for a university is $10,000 this year and increases 4% every year. In one year, the tuition will be $10
seropon [69]

Answer:

<em>The programming language is not stated; however, I'll answer using Python programming language (</em><em>Se</em><em>e attachment</em><em> </em><em>for</em><em> </em><em>proper </em><em>for</em><em>mat</em><em>)</em>

tuition = 10000

rate = 0.04

for i in range(1,15):

tuition = tuition + tuition * rate

if i <= 10:

print("Year "+str(i)+" tuition:",end=" ")

print(round(tuition,2))

if i == 14:

print("Tuition 4th year after:",end=" ")

print(round(tuition,2))

Explanation:

<em>The first 2 lines initializes tuition and rate to 10000 and 0.04 respectively</em>

tuition = 10000

rate = 0.04

<em>The next line iterates from year 1 to year 14</em>

for i in range(1,15):

<em>This line calculates the tuition for each year</em>

tuition = tuition + tuition * rate

<em>The next 3 lines prints the tuition for year 1 to year 10</em>

if i <= 10:

print("Year "+str(i)+" tuition:",end=" ")

print(round(tuition,2))

<em>The next 3 lines prints the tuition at the 4th year after year 10 (i.e. year 14)</em>

if i == 14:

print("Tuition 4th year after:",end=" ")

print(round(tuition,2))

7 0
3 years ago
Discribe two ways you can zoom in and out from an image
krek1111 [17]

Answer:

Select the Zoom tool, and then do any of the following:

<h2>#1. </h2>

Click and hold in the image to zoom in. Press Alt (Windows) or Option (Mac OS) to zoom out.

<h2>#2!</h2>

In the options bar, select Scrubby Zoom. Then drag to the left in the image to zoom out, or to the right to zoom in.

<h2>psst! pls, brailiest!</h2>
3 0
3 years ago
Read 2 more answers
Which two keys are commonly used to move or insert data?.
vlabodo [156]

Answer:

control and shift

Explanation:

6 0
2 years ago
Other questions:
  • A Hierarchy Custom Setting stores a specific URL for each profile in Salesforce. Which statement can a developer use to retrieve
    5·1 answer
  • When enter a function or formula in a cell, which is the character you must type?
    14·1 answer
  • Which character is often used to identify registered trademarks and is available on the Insert tab and Symbols
    5·1 answer
  • What is a third variable condition that could create the following correlation?
    10·2 answers
  • What is data? why is it important to collect data ? explain the points.​
    10·1 answer
  • use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
    13·1 answer
  • What accesses organizational databases that track similar issues or questions and automatically generate the details to the repr
    14·1 answer
  • What is the output?<br> str = 'abcdef<br> print(str[2:50)
    6·2 answers
  • What relationship do MP3s and MP3 players have with video files?
    11·1 answer
  • Hewo want to talk! #bored<br>Will randomly mark brainlest
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!