1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
5

Draw a flowchart or write pseudocode to represent the logic of a program that allows the use to enter values for the width and l

ength of a room's floor in feet. the program outputs the area of the floor in square feet
Computers and Technology
1 answer:
DIA [1.3K]3 years ago
3 0
In psuedocode it would be:

length = input()
width = input()

area = length * width

print(area + " sq ft");

You might be interested in
Implement the sum_positive_numbers function, as a recursive function that returns the sum of all positive numbers between the nu
lakkis [162]

Answer:

def sum_positive_numbers(n):

if(n==0 or n==1): #if n is 0 or 1 return n as its sum also will be n

return n

return n+sum_positive_numbers(n-1) #else return n and sum of all the number smaller then n

print(sum_positive_numbers(3)) # Should be 6

print(sum_positive_numbers(5)) # Should be 15

Explanation:

5 0
3 years ago
Assume you have a usb mouse, usb keyboard, and usb printer to connect to a computer, but you have only two usb ports. explain on
atroni [7]

I guess the solution to that problem is that you should expand your USB ports, in order for you to do that is the best solution is you should buy a USB hub so that the number of USB ports will expand, and then plug your USB hub to one of your computer's USB port. After plugging the USB hub, you can now plug your USB  mouse, USB keyboard and USB printer to the ports of your USB hub.

8 0
3 years ago
Is there a relationship between cybercrime and traditional crime?
Vika [28.1K]

Answer:

Both of them have only one similarity and that is the intent. Otherwise they are different. Traditional crime required physical labor on majority of occasions, whereas the cyber crime requires always brain and coding only. However, all sites are not information sites. There are various types of sites like eCommerce sites, Content management sites, web applications, mobile friendly sites( for all types of sites) and many more. What you need to do now is certainly to find how the cyber attack is committed. Like by injecting malicious codes through the openings like in WordPress sites we have third party plugins which are always where these malicious codes are injected. How good your authentication is, is also a criteria. You will find at times that all the pages are not covered through authentication like file upload. Malicious files can be uploaded at times when you do not mention what type of files can be uploaded, and thus the hacker can hack your site and put you in vulnerable positions. Now you need to find all these  types of situations, and then you can mention how you can opt for a security for each of them. This is a very important issue and all the big companies consider each such risk and their remedies while making a site.

Explanation:

The answer is I feel enough to cater the requirement.

5 0
4 years ago
Which is the most efficient way to make a row of text bold in every worksheet in a file?
alexdok [17]

B is you’re answer.

7 0
3 years ago
If you have a computer that is not Bluetooth enabled, you can purchase a Bluetooth ____________________ that will convert an exi
sveta [45]

Answer:

Wireless Porter Adapter

Explanation:

Bluetooth Wireless Porter Adapter is a USB-based device that transmits and receives Bluetooth wireless signals. It plugs into the USB port to support Bluetooth mice, keyboards and other Bluetooth devices.

6 0
3 years ago
Other questions:
  • Which form of measurement is the largest?
    11·2 answers
  • ZO
    14·1 answer
  • You are a network administrator at your company. A user attempts to start a computer and receives the following error message: "
    6·1 answer
  • Charles is having a lot of problems with errors in a very complicated spreadsheet that he inherited from a colleague, and he tur
    8·1 answer
  • Select the correct answer.
    9·2 answers
  • Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.
    8·1 answer
  • Write a method, including the method header, that will receive an array of integers and will return the average of all the integ
    7·1 answer
  • Which of the following is not an example of a cyber crime?
    8·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    10·1 answer
  • Html quickly evolved through specifications that are the result of the collective work of the organization known as the ____.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!