1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leni [432]
3 years ago
9

How to do “Pseudocode” and “FlowChart” in this question ? Please Help mee

Computers and Technology
1 answer:
Amanda [17]3 years ago
6 0

Answer:

There is no complicated algorithm required for this problem. After getting the inputs from initial velocity (u), acceleration (a), and time (t), <em><u>you can use the kinematics formula: x=ut + (1/2)at^2</u></em> to solve for the distance traveled.

Explanation:

Some very simple pseudocode:

1. Get Initial Velocity and set as u

2. Get Acceleration and set as a

3. Get Time and set as t

4. Set x to u*t + (1/2)*a*t*t

5. Return x

You might be interested in
While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an al
inna [77]

Answer: the corret answer C. The analyst has prefetch enabled on the browser in use.

Explanation:

The analyst has like an indicator which is prefetch enabled on the browser in use.

7 0
3 years ago
How many bits are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 12 bits o
AURORKA [14]

Just multiply all numbers to get the total number of bits:

25*50*12 = 15000 bits.

3 0
3 years ago
Look at the picture lol
andrey2020 [161]

Answer:

Zoom in more please and than i can help

Explanation:

6 0
3 years ago
Read 2 more answers
A) How can jitter be reduced on a user’s PC if there is jitter in incoming packets?
ELEN [110]

Answer:

a.) Incoming packets can be placed in the buffer and played back without the jitter.

b.) Buffering would increase the latency because there would be a delay in time when the packets enter the buffer and the time is released.

Explanation:

Jitter is referred technically as a packet delay variations.

It is variation in the periodicity of periodic events or a signal from target or the true frequency.

6 0
3 years ago
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
4 years ago
Other questions:
  • Why can't you test a program for run-time errors when it has compile-time (syntax) errors
    6·1 answer
  • An unwanted program that can spread itself to other computers is called what?
    15·2 answers
  • 1. Implement a method factorial(int n), that takes a number (int) and returns its factorial. Factorial of an integer is the prod
    13·1 answer
  • After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?
    14·1 answer
  • Which of the following is an input device? (Select all that apply)
    13·1 answer
  • ___________________ are aggregated collections of memory and cpu resources that can be shared among groups of virtual machines o
    11·1 answer
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
  • Which IDEs support multiple high-level programming languages? Select all that apply.
    13·1 answer
  • Select the correct answer from each drop-down menu
    7·1 answer
  • I need app ideas for basic everyday problems​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!