1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tpy6a [65]
4 years ago
10

Create a Sub called "daisyDecisions" that runs when you click a button. In this sub, you will create a program that determines w

hether he/she loves you, or loves you not. The program should receive, as an input, the number of petals on the flower (i.e., have a variable for petals) and then use that number to determine the output of the program: if the number of petals is even, then the program should output that he/she loves you not, if odd, then he/she loves you.

Computers and Technology
1 answer:
jenyasd209 [6]4 years ago
7 0

Answer:

see explaination

Explanation:

Please find the screenprint and the VBA code. As shown in the screenprint, range B1 is used to enter the number of petals. If you want to use a different cell for petals input, then change the code accordingly.

Also, the VBA code is placed in the Sheet1 module. No new modules are inserted.

Screenprint: see attachment for screenshot

VBA Code:

Private Sub CommandButton1_Click()

Call daisyDecisions

End Sub

Private Sub daisyDecisions()

Dim remainder As Integer

Dim noOfPetals As Integer

noOfPetals = Sheet1.Range("B1").Value

remainder = noOfPetals Mod 2

If remainder <> 0 Then

MsgBox "He/She loves you!!!"

Else

MsgBox "He/She loves you not!!!"

End If

End Sub

You might be interested in
Draw the flowchart to calculate the area of the rectangle 50m length and width 30m.​
marta [7]

Answer:

---- ----

Explanation:

1) Start

2) Rectangle: Read Length and Width.

3) Calculate

4) Print (Calculate)

8 0
3 years ago
What type of attack is dependent on sending packets too large for the server to handle?
Art [367]
I think the answer is a kernel attack. Kernel attacks often send corrupted packets, but they also send large packets, allowing the server to crash and make an opening.
7 0
3 years ago
What is a 'balanced' dfd?
jasenka [17]

Answer:

 The balanced DFD (Data flow diagram) is the concept of the balancing all the state and incoming and also outgoing flow in the system.

The balanced data flow diagram basically ensure that the output and input data flow maintain the consistency in the DFD and are properly aligned the flow of data.

A balanced DFD does not include any type of flowchart in the control statement and also does not contain any crossing lines.

8 0
4 years ago
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific
Vera_Pavlovna [14]

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

7 0
3 years ago
A patient asks her doctor to send a copy of her records to another medical office. However, the records are not transmitted beca
bezimeni [28]
 This type of security failure is called WIN32K_SECURITY_FAILURE. <span> This indicates a </span>security failure was detected in win32k. <span>According to a new report issued by Dark Reading, there are a number of key </span>security failures<span> that cybercriminals take advantage of.</span>
5 0
4 years ago
Read 2 more answers
Other questions:
  • T-shaped, square-bottomed, dovetailed, and V-shaped are all types of _______ in a machined part. A. gears B. bolts C. lines D. s
    8·2 answers
  • Select two netiquette guidelines. In a paragraph of no less than 125 words, explain why these guidelines make professional onlin
    9·1 answer
  • An ARP broadcast is sent to the special MAC address _______.
    9·1 answer
  • Compare and contrast fair use to copyright.
    5·1 answer
  • In their legacy system. Universal Containers has a monthly accounts receivable report that compiles data from Accounts, Contacts
    6·1 answer
  • Convert the following into binary system<br>and vice versa.<br>106​
    6·2 answers
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    8·1 answer
  • What kind of skills does an electronics engineering tech need as requirement in the workplace?
    6·1 answer
  • Importance of spread sheets​
    8·2 answers
  • What do you do when ur grounded from all electronics and can't go outside and have t clean all day
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!