1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Step2247 [10]
3 years ago
5

Draw a flowchart diagram for a program that display a person's name x times​

Computers and Technology
1 answer:
Gemiola [76]3 years ago
8 0

Answer:

See attachment for flowchart

Explanation:

The flowchart is as follows:

Step 1: Start

This signals the beginning of the flowchart

Step 2: Input name, x

This gets input for name and x from the user

Step 3: count = 0

This initializes count to 0

Step 4: Print name

This prints the person's name

Step 5: count = count + 1

This increments the number of times the name has been printed

Step 6: count = x?

This checks if the number of times the name has been printed is x times

<em>If yes, step 7 is executed.</em>

<em>If no, step 4 is executed</em>

<em></em>

Step 7: Stop

This signals the end of the flowchart

You might be interested in
What is the outlined area called?
Yakvenalex [24]

Answer:

Ribbon

Explanation:

I would want to believe that this question is asking us about the outlined area in the image attached below. The ribbon consists of the main tabs you see when you open up your Word document by default. They include the home, insert, page layout, in that order, all the way upto the view tab. The main tabs are split into groups and these groups are further split into command options that help users complete a task. If you want to, you can minimize the ribbon and remain with the tab names only by hitting CTRL + F1

5 0
4 years ago
Romans are credited with “inventing” the capital city l? T or F
Law Incorporation [45]

Answer:

T

Explanation:

just finished the assignment on edge

5 0
3 years ago
Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in
lisabon 2012 [21]

Let us assume that Sam has an Active Directory Domain in his SOHO network.  He can use features that come with an AD domain to deploy software packages via Group Policy Objects. These features from Microsoft not only give us simple ways to deploy software, but also provide solutions to uninstall too. Another option to consider using is through 3rd party software solutions like PDQ Deploy. This tool will help deploy any Windows application to multiple PCs in the same workgroup.

4 0
4 years ago
How to know your pc does not have bluetooth?
sattari [20]
Assuming you're running Windows, click the start button, and then search for "Device Manager" (or open CMD or PowerShell and type devmgmt.msc). Look at the list of devices. If Bluetooth is there, you have it; if it's not there, you don't. 
4 0
3 years ago
When code is compiled it
lesantik [10]

Answer:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file. In short, it's A or D.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which type of operation writes the file system structure to the disk?
    5·1 answer
  • What are some ways to change column width? Check all that apply.
    13·2 answers
  • Why was Unicode invented?
    11·1 answer
  • Baris script yang digunakan mendefinisikan website yang akan diblokir proxy server adalah
    5·1 answer
  • Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. Given a variable modelYear write a statement that prin
    9·1 answer
  • You have a brand-new monitor and you want to make sure you are getting the most out of it. For this reason, you decide to alloca
    13·1 answer
  • Assume that the variable data refers to the list [5, 3, 7]. Write the expressions that perform the following tasks: a. Replace t
    8·1 answer
  • Define operator precedence ? explain with an example.​
    13·1 answer
  • Hi I'm new here can everyone add me as frein ​
    8·1 answer
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!