1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Triss [41]
3 years ago
8

Design an algorithm to generate the first n terms of sequence 2,6,10,14​

Computers and Technology
1 answer:
gavmur [86]3 years ago
8 0

Answer:

#Begin

a=2

k=0

temp=0

#Input

k=input()

temp=k

k=0

#Processing

while int(k)<int(temp):

print(a)

a=a+4

k=k+1

You might be interested in
What are three ways to protect yourself from identity theft when using your smartphone or computer?.
raketka [301]

Answer:

1. Always download the latest updates .

2. Don’t click on rogue links .

3.Secure your devices (long, complex password on your computer and phone, using Anti-virus/Anti-Malware program) .

5 0
3 years ago
What is an IF statement used for?
kiruha [24]

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

8 0
3 years ago
Melissa and Sue want to distribute a document to be discussed at a meeting starting in about thirty minutes. People will be atte
Anettt [7]
The answer is (c) fax the document to each location


Since fax machines are all connected to the old telephone lines, when used, they place a phone call to the number you have specified. This machine at the destination number on the other end receives and the transmission of documents is done over a telephone call. 

Melissa and Sue will also be in a position to send this fax using a computer if the computer will be connected to the phone line and a presence of a dial-up fax modem.




3 0
3 years ago
The actual database of Active Directory shared resources is stored on one or more computers designated as:
loris [4]

Answer:

The network the actual database of active directory shared resources are stored on one or more computers.

Explanation:

The network:- it is shared resources where it accesses or connected multiple personal computers or workstations or laptops.  So that file or folder have shared the resources

Domain controllers:- It is the server where end-user is able to login into domain server

The extranet:- It is an external net where end-user just access the ISS  server.  This data can be shared  inside and  outside of the network  

The Intranet:-it  is internal  access of   network where  just access  the ISS  server, where data  can be shared  only internal

8 0
4 years ago
1. Flash Drive Price - An electronics company makes 64 gigabyte USB flash drives that cost them $8.00 apiece to produce. Write a
BaLLatris [955]

The programs are illustrations of sequential programs,

<h3>What are sequential programs</h3>

Sequential programs are programs that do not require loops (iterations) and conditional statements.

<h3>The flash drive program</h3>

The flash drive program written in C++ where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

int main(){

   //This calculates the selling price

   double sellingPrice = 8.00 * 1.35;

   //This prints the selling price

   cout<<"Selling price: $"<<sellingPrice;

   return 0;

}

<h3>The basketball program</h3>

The basketball program written in C++ where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

int main(){

   //This initializes the height in inches

   int heightInches = 75;

   //This prints the height in feet/inches

   cout<<"Height: "<<(heightInches/12)<<" feet, "<<(heightInches%12)<<" inches";

   return 0;

}

Read more about sequential programs at:

brainly.com/question/17970226

3 0
3 years ago
Other questions:
  • Phillip wants to create a new Google Display Ad campaign and base his targeting on an existing remarketing list named Checkout A
    10·1 answer
  • What is the python code for these problems (100 points): Ask the user to enter a name. If there is an ‘a’ in the name, print a m
    8·1 answer
  • Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?
    9·1 answer
  • Question 4 of 5
    5·2 answers
  • What port is typically reserved and utilized by the Secure Hypertext Transfer Protocol to create a secure connection to a Web se
    13·1 answer
  • How does one award the brainliest???? will give brainliest.
    8·2 answers
  • The data type that can hold decimal or fractional values
    14·1 answer
  • Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
    5·1 answer
  • Rebbeca has finished with the research and outline portion of her slide presentation. Now, the next logical step is to begin wor
    11·1 answer
  • 1. Who is known as the father of a computer?​
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!