1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
9

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate cond

itional statement for this
Computers and Technology
1 answer:
Anni [7]3 years ago
7 0

Answer:

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

  3.1 Create bottle

  3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

<em>See attachment for flowchart</em>

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

  3.1 Create bottle

This increments the number of bottles by 1

  3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

<em></em>

<em></em>

You might be interested in
Natural language generation is focused on?
Mila [183]

While natural language understanding focuses on computer reading comprehension, natural language generation enables computers to write. NLG is the process of producing a human language text response based on some data input. This text can also be converted into a speech format through text-to-speech services.

<em>-</em><em> </em><em>BRAINLIEST</em><em> answerer</em>

6 0
3 years ago
An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
LenKa [72]

Answer: Virus Hoax

Explanation:

A computer virus hoax is a message that warns someone of a false virus threat. It is a a chain email that encourages who ever has received the message to pass it to other people as a form of warning.

5 0
3 years ago
Convert the following decimal numbers into binary numbers. <br><br>pls ASAP<br>​
Anna007 [38]

Explanation:

Given, the cost price of the TV is Rs 24600. Now, the cooler costs Rs 800 more than one-third of the TV. The cost price of the cooler is Rs 9000.

6 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Business application software programs make it possible to
Daniel [21]
Business application software programs make it possible to: increase productivity in the office setting.
Please give me Brainless if this help!!
6 0
3 years ago
Other questions:
  • To delete a note, select the note reference mark in the footnote text by dragging through the note reference mark, and then clic
    6·1 answer
  • Which of the following statements is false? a. Racks and bins are examples of storage equipment. b. Automation refers to equipme
    9·1 answer
  • Write an essay of at least 300 words explaining your position on a proposed ban of Wikipedia in your future college. You should
    12·1 answer
  • Anybody know this question???
    6·1 answer
  • What is the purpose of a poster frame?
    5·2 answers
  • According the SDLC phases, which among these activities see a substantial amount of automation initiatives?
    12·2 answers
  • What is the default return type of a method in Java language?
    9·2 answers
  • Greg wants to check the amount of requests his website receives. What test can he use?
    6·1 answer
  • Why do we use the internet so much?​
    6·1 answer
  • C. List three obstacles to effective listening.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!