1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
14

This algorithm requires you to find the perimeter of 12 different squares.

Computers and Technology
1 answer:
k0ka [10]3 years ago
4 0

Answer:

BEGIN

SET count = 1

WHILE count <= 12 THEN

     INPUT length

     perimeter = length * length

     PRINT perimeter

END WHILE

END

Explanation:

You can also set count to 0 and in while loop use count < 12 to loop just 12 times just as above

You might be interested in
Joshua Lee, an engineer at Footprints Inc., is provided with a design by the creative team in his company for creating a softwar
tamaranim1 [39]

Answer:

Development & implementation phase

Explanation:

There are mainly six stages of SDLC, which are as follows:

1. Planning: Planning is the first step in app development, where the developer preplans every aspect of the software.

2. Analysis: After planning, the developer analyzes further requirements to develop the software as per planning.

3. Design: After planning and analysis, the developer makes the design which is the main architecture of the software.

4. Development & implementation: When the developer completes the design, the development phase comes in where the data is coded and recorded as per requirement and after development, implementation takes place to see if software functions properly or not.

5. Testing: Testing mainly tests the programs to check for any errors or bugs.  

6. Maintenance: When the software is developed successfully, then time to time maintenance and updation of the software takes place to maintain and upgrade its working.

Hence according to the scenario, development & implementation phase is the right answer.

7 0
3 years ago
Which of these is NOT a type of spoofing? sending an e-mail that says it is from a certain bank but it is not
ArbitrLikvidat [17]

The option that is not  a type of spoofing is creating a fake website for a well-known business.

<h3>What is email spoofing?</h3>

Email spoofing is known to be a method  that is often used in spam and other forms of phishing attacks. This is often done to trick computer users to see that a message originate from a person or firm that they know.

Conclusively, The option that is not  a type of spoofing is creating a fake website for a well-known business as it is not what spoofing  is all about.

Learn more about spoofing from

brainly.com/question/23021587

#SJ1

3 0
2 years ago
Suppose we have two threads inserting keys using insert() at the same time. 1. (5 points) Describe the exact sequence of events
Leona [35]

Answer:

Say you have a key in a dictionary, or a key in a 2-d list. When you insert(), you are destructively iterating the original list and modifying it to reflect the insert() component. In order for the key to get lost you would have to do say insert(len: :1) which would remove the second key and therefore cause it to get "lost" because it will be destructivsly removed from its assignment and replaced by whatever you choose to insert.

Rate positively and give brainlist

8 0
3 years ago
Write a C++ program to store 10 student names and grade point averages (GPAs) from the user. Display all student information in
Aleksandr-060686 [28]

Answer:

Answer to this question is given below in the explanation section.

Explanation:

 

#include <iostream>

#include<iomanip>

#include <string>

#include <cctype>

using namespace std;

int main()

{

   string firstName[10], lastName[10];//variable declaration

   double gpa[10];

   for(int i=0; i<10;i++)//loop for entering 10 students record

   {  

       cout<<"Enter data for student: "<<i+1;//start from 1

       cout<<"\nEnter First Name: ";

       cin>>firstName[i];

       cout<<"Enter Last Name: ";

       cin>>lastName[i];

       cout<<"Enter the GPA: ";

       cin>>gpa[i];

   }

  cout<<"\n*********************************************************************";

  cout<<"\n"<<setw(30)<<"Student Data";//setw set the space to 30

  cout<<"\n*********************************************************************";

  cout<<"\n";

  cout<<setw(10)<<"First Name"<<setw(25)<<"Last Name"<<setw(25)<<"GPA";//display column header

  for(int i=0; i<10; i++)//display student entered record

  {

      cout<<"\n"<<setw(10)<<firstName[i]<<setw(25)<<lastName[i]<<setw(25)<< setprecision(3)<<gpa[i];//setprecision function set the decimal limit to 2

  }

  cout<<"\n*********************************************************************";

  cout<<"\n"<<setw(30)<<"Finished";

  cout<<"\n*********************************************************************";

   

   

   return 0;

}

                                                                                                                                                                                                                                                             

6 0
3 years ago
Drag the tiles to the correct boxes to complete the pairs. Match the tools that you can use while solving a problem with their c
Lana71 [14]

1. A

2. Algorithm

3 Flowchart

4. Heuristic


Sorry that it's a bit late. Hopefully this is still of some use to you.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    11·2 answers
  • What are the features of a strong résumé? Check all that apply.
    7·1 answer
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    11·1 answer
  • A function is a built-in formula in a spreadsheet. <br> a. True<br> b. False
    8·2 answers
  • the computer that communicate with each other are called ______please ask the answer in 15 minutes after 1 p.m. ​
    9·1 answer
  • Write a Python program which asks a user for a word and performs letters manipulation. If the word is empty, the program should
    6·1 answer
  • Which situations are better suited to an indefinite (while) loop? Select 3 options.
    5·2 answers
  • A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
    12·2 answers
  • Define the term hardwar<br><br>​
    9·2 answers
  • Traffic flow analysis is classified as which?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!