Using the knowledge of pseudocodes it will be possible to write a code that calculates the amount of hours worked and giving warnings about it.
<h3>Writing a pseudocode we have that:</h3>
<em>while </em>
<em>if number == 0</em>
<em>break</em>
<em>hours =0 </em>
<em>for i =1 to 5 </em>
<em>hours = hours + time_out[ i ] - time_in[ i ]</em>
<em> If hours >36 : </em>
<em>print ( "Name is " ,name)</em>
<em>print( "No of hours are ",hours)</em>
<em>print("Congratulaion! Your working hours are more than 36")</em>
<em>If hours <30 : #</em>
<em>print ( "Name is " ,name)</em>
<em>print( "No of hours are ",hours)</em>
<em>print("Warning !!!")</em>
<em>End loop</em>
See more about pseudocode at brainly.com/question/13208346
#SPJ1
Hi,
the program is as follows
___________________________________________________________
import java.io.*;
class doubleval
{
public static void main()throws IOException
{
DataInputStream dt=new DataInputStream(System.in);
System.out.println("Enter NUMBER WHOSE DOUBLE U WANT TO PRINT");
int n=Integer.parseInt(dt.readLine());
for(int i=n;i<=100;i=2*i)
{
System.out.println(i);
}
}
}
Answer: The ASOS systems serves as the nation's primary surface weather observing network. ASOS is designed to support weather forecast activities and aviation operations
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.
You could download it to another device, and send the music to the laptop. That, or you can plug it into the USB port.
I hope this helps!