1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tamiku [17]
4 years ago
15

Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter a value for one edge of a

cube. The program calculates the surface area of one side of the cube, the surface area of the cube, and its volume. The program outputs all the results.
Computers and Technology
1 answer:
morpeh [17]4 years ago
8 0

Answer:

I'll answer this question with a Pseudocode

<em>1. Start</em>

<em>2. Input Length</em>

<em>3. Surface Area1 = Length * Length</em>

<em>4. Surface Area2 = 6 * Surface Area1</em>

<em>5. Volume = Length * Length * Length</em>

<em>6. Print Surface Area1</em>

<em>7. Print Surface Area2</em>

<em>8. Print Volume</em>

<em>9. Stop</em>

<em />

Explanation:

The first line starts the Pseudocode

The second line accepts input for Length of the cube

The third line calculates the surface area of 1 side

The fourth line calculates the surface area of the cube

The fifth line calculates the volume of the cube

The sixth to ninth line prints the calculated parameters

The Pseudocode ends on line 9

You might be interested in
Why is a high-quality bond typically considered a lower-risk investment than a stock
FinnZ [79.3K]
Its high quality bond typically considered a lower risk investment than a stock because you need to find the answer on your own
5 0
3 years ago
Read 2 more answers
What type of e-mail typically lures users to sites or asks for sensitive information?
Evgen [1.6K]

The  type of e-mail typically lures users to sites or asks for sensitive information is phishing.

<h3>What is a phishing email?</h3>

Phishing is a type of internet scam where cyber hackers impersonate legitimate organizations via email, text message, advertisement or other means in order to steal sensitive information.

This criminals usually send an email link mimicking the company .

The aim of the email is to get sensitive information in order to access your funds or private information.

learn more on phishing email here: brainly.com/question/14954901

#SPJ11

8 0
2 years ago
3. Create mode was one of the most innovative and influential features of which of the following games?
melamori03 [73]
FarmVille would be the correct answer because it is a game where you build a create your own farm without nobody telling you to this or that
8 0
3 years ago
Frankie used the ps command to find the process id of an application that he needs to stop. What command-line tool should he use
ASHA 777 [7]

In the case above, the command-line tool should he use to stop the application based on its process id is e option

What is the use of ps command?

The ps command is known to be one that helps enables a person to be able to look at the status of any kind of active processes on a system, and also that of display technical information in regards to the processes.

Note that In the case above, the command-line tool should he use to stop the application based on its process id is e option

Learn more about command-line tool from

brainly.com/question/3737699

#SPJ1

7 0
2 years ago
Jeremy Bridges is an executive for Green Web Designs, where his primary role is to ensure the security of business systems and d
klasskru [66]

Answer:

Chief Security Officer

Explanation:

According to the given statement in the question the Jeremy's role in the company is "Chief Security Officer (CSO)".

The chief Security officer has the role of developing and looking on to the strategies and policies that are required for maintaining the operational, strategic, financial and reputational security  of the  overall company.

6 0
3 years ago
Other questions:
  • Tower defense is included under which genre of game
    15·2 answers
  • Data means a group of numbers. <br> a. True<br> b. False
    7·1 answer
  • Write a function called printEvens that prints all the even numbers between 2 and 20, inclusive. It will take no arguments and r
    6·1 answer
  • Write a program to convert a fraction to a decimal. Have your program ask for the numerator first, then the denominator. Make su
    10·1 answer
  • I'm having trouble changing my google account password
    12·1 answer
  • Activity
    7·1 answer
  • The most common clefs for high notes are what?
    6·2 answers
  • Can you please help me
    9·1 answer
  • What is the expression for the resultant value of three capacitance where C1 connected in parallel​
    11·1 answer
  • a company recently implemented a secure sockets layer/transport layer security (ssl/tls) version that supports secure hashing al
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!