1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
11

Draw a flowchart to accept two numbers, and then output the result as the first number

Computers and Technology
1 answer:
spin [16.1K]3 years ago
8 0

Answer:

See attachment for flowchart

Explanation:

- The flowchart starts and ends with an oval shape.

- The flowchart accepts input for variables First and Second using the parallelogram shape.

- After both inputs have been collected;

The flowchart calculates First^Second and stores the result in variable Result.

-The value of Result is printed, afterwards.

You might be interested in
What microprocessor was the first to be processable<br> ?
vlada-n [284]
Hey there!

Here is your answer:

<u><em>The proper answer to this question is "the 4004".</em></u>

Reason:

<u><em>The 4004 was the first microprocessor that was process able. It was made by Intel The first microprocessor was designed in 1968.</em></u>

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
8 0
3 years ago
What is computer topology​
Nitella [24]

Answer:

In networking, topology refers to the layout of a computer network. ... Physical topology means the placement of the elements of the network, including the location of the devices or the layout of the cables. Logical topology maps the flow of data, regardless of the physical layout.

...hope it helps...

7 0
3 years ago
Read 2 more answers
Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
Arte-miy333 [17]

In order to gain repeated and long-term access to the network system in the future, Meta should perform privilege escalation.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, in order to identify, test and check for exploitable vulnerabilities in the following:

  • Web software
  • Host device
  • Network

Hence, a pen test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments of the system.

In Cybersecurity, privilege escalation can be defined as a process that involves the exploitation of a design flaw, software bug or configuration setting in a network, so as to gain repeated and long-term (elevated) access to the network or software application in the future. Thus, Meta should perform privilege escalation to enable her gain repeated and long-term access to the network system in the future.

Read more: brainly.com/question/24112967

7 0
3 years ago
What is the difference between a surge and a spike?
Anna [14]
D, I think. I may be wrong. Someone comment and tell me
3 0
3 years ago
Write the function definition for a function called list_total that accepts a list of integers
uranmaximum [27]

Answer:

def list_total(numbers):

   sum_of_numbers = 0

   for number in numbers:

       sum_of_numbers += number

   return sum_of_numbers

Explanation:

So, to define a function, the syntax is simply:

def functionName(arguments here):

   # code

So to define a function called "list_total" which accepts a list of integers, you write:

"

def list_total(numbers):
   # code

"

any the "numbers" is a parameter, and it's just like any variable, so you can name it anything besides keywords. I just named it "numbers" since it makes sense in this context, you could also write "integers" instead and it would be just as valid, and may be a bit more specific in this case.

Anyways from here, the initial sum should be equal to 0, and from there we add each number in the list to that initial sum. This can be done by initializing a variable to the value "0" and then traversing the list using a for loop. This can be done as such:

"

def list_total(numbers):

   sum_of_numbers = 0

   for number in numbers:

       # code

"

So for each element or integer in the list "numbers" the for lop will run, and the variable "number" will contain the value of the current element it's on.

So we can add the "number" to the sum_of_numbers as such:

sum_of_numbers = sum_of_numbers + number

but there is a shorter way to do this, and it's represented as:

sum_of_numbers += sum_of_numbers

which will do the same exact thing. In fact this works for any mathematical operation for example:

a *= 3

is the same thing as

a = a * 3

and

a /= 3

is the same thing as

a = a / 3

It's the same thing, but it's a much shorter and more readable notation.

Anyways, this code will go in the for loop to almost finish the code

"

def list_total(numbers):

   sum_of_numbers = 0

   for number in numbers:

       sum_of_numbers += number

"

The last thing is to return this value, and this is simply done by using the syntax:

"return {value here}"

and since the sum_of_numbers has the value, we write

"return sum_of_numbers"

at the end of the function, which is very very important, because when you use the return keyword, you end the function, and return whatever value is next to the return to the function call

So to finish the code we just add this last piece to get:

"

def list_total(numbers):

   sum_of_numbers = 0

   for number in numbers:

       sum_of_numbers += number

   return sum_of_numbers

"

7 0
2 years ago
Other questions:
  • In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
    6·2 answers
  • Create a program that asks the user to enter grade scores. Use a loop to request each score and add it to a total. Continue acce
    9·1 answer
  • What should you do to organize a large amount of data??
    10·1 answer
  • Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthe
    6·1 answer
  • What malware looks like a useful or desired executable program but is, in reality, a program that is supposed to cause harm to y
    11·1 answer
  • Which statement uses the example type of context clue for the underlined word?
    5·2 answers
  • Write the algorithm for finding the perimeter of a rectangle using English like form step by step
    10·1 answer
  • You’ve found the file you’ll be working with. Next, you decide to move
    13·1 answer
  • Create a query that shows columns employee last name, job title and hire date for those employees who joined the company on or a
    7·1 answer
  • what extension of nat allows several hundred workstations to access the internet with a single public internet address
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!