1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ber [7]
3 years ago
7

Help plz,l didn’t pay attention in class

Computers and Technology
1 answer:
castortr0y [4]3 years ago
5 0

Answer:

a) Input the marks value

b) Distinction

c) If marks =>50

d) Fail

Explanation:

The missing box entries in the flow chart from top to bottom are as follows -

a) Input the marks value

b) Distinction

c) If marks =>50

d) Fail

You might be interested in
Write a class called Dragon. A Dragon should have a name, a level, and a boolean variable, canBreatheFire, indicating whether or
Alex Ar [27]

Answer: A dragon name could be name Holls and at level 14 and can breathe fire

Explanation:

4 0
3 years ago
Computer that process digital as well as analogue signals​
Nuetrik [128]

Answer:

The answer is hybrid computer coz it is the combination of both analog and digital computers

Explanation:

hope it helps

good day

5 0
3 years ago
Select the correct line of missing code to create an output of "hello."
s2008m [1.1K]

Answer:

B

Explanation:

This feels like an error on the question issuer's part.

3 0
2 years ago
C Programming:
natita [175]
This is how to answer this programming question:

#include <stdio.h>
#include <conio.h>

int main(void)
{
   char letterStart;
   
   <span>fflush(stdin);</span>
   printf("Input character: ");
   scanf("%c", &letterStart);
   
   print("Next Letter: %c", ++letterStart);
   
   getch();
   clrscr();
}

7 0
3 years ago
Read 2 more answers
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle i
pochemuha
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?
3 0
3 years ago
Other questions:
  • Switches operate on what layer of the OSI Model
    11·1 answer
  • How do I make Dank memes
    13·2 answers
  • Write a program that produces a Caesar cipher of a given message string. A Caesar cipher is formed by rotating each letter of a
    14·1 answer
  • When you tell a computer what to do, you are providing input?
    11·1 answer
  • The Cisco IOS automatically modifies the dead interval when the _____ interval is changed. (Points : 2) hello
    13·1 answer
  • In what stage of an algae or fungi life cycle are they able to reproduce spores?
    10·1 answer
  • Explain the difference between undecidable problems and unreasonable time algorithms. Be specific.
    5·1 answer
  • PHOTOSHOP IS A GRAPHICS EDITING PROGRAM CREATED WITH IMAGES KNOWN AS________ ​
    6·1 answer
  • PLS HURRRYYYYYY!1!1!1!1!1
    5·2 answers
  • Lots of Ways to Use Math.random() in JavaScript
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!