1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
amm1812
3 years ago
15

I need so much help, can anyone please help me?

Computers and Technology
1 answer:
Serggg [28]3 years ago
6 0

Answer:

I'm not sure about it, but it's something similar.

Explanation:

array name[3]

array marks[3,5]

Total←0

Average Mark←0

For Count ←1 To 3

WRITE "Input name"

INPUT array name[3]

NEXT

FOR Count ← 1 TO 5

WRITE "Enter Mark"

INPUT ←array mark[3,5]

Total ← Total+Mark

NEXT

avg ←Total/5

WRITE “Total of 5 Marks is:”, Total

WRITE “Average of 5 Marks is:”, avg

You might be interested in
Which method is useful for dimensionality reduction especially for small data-sets?
Anna [14]
Independent Component Analysis (ICA) is based on information-theory and is also one of the most widely used dimensionality reduction techniques.
8 0
2 years ago
...............................
Gemiola [76]

............................

Mark me brainliest^^

7 0
2 years ago
Read 2 more answers
What is a Caesar cipher? As part of your answer demonstrate encrypting the plaintext messages: CS IS COOL with a caesar cipher.
sweet [91]

Answer:

A Caesar Cipher is a basic encryption type.

Explanation:

Its implementation is very easy and straightforward. It uses a one-to-one of characters in a character set. The input needed is the plain-text message and the encryption number.

For example, using the character set A-Z, encrypting the text CS IS COOL using the key of 3 generates FV LV FRRO. What has been done here is to take each character in the plain-text message and move it by "encryption number steps" in the character set.

8 0
3 years ago
How much memory did the first smartphone have?
hjlf

Memory 1 MB (2 × HM658512LTT PSRAM)

Storage 1 MB of NOR Flash expanded to 2 MB by Stacker compression + 32KB BIOS NOR Flash

6 0
3 years ago
29
denis23 [38]

The correct answer is A it transfers control to the next loop in the program.


The most valid answer is that the break statement Exits the loop and continues executing the program, but assuming that there are other loops, the control of the program will go to them since the first loop is broken out of.


3 0
3 years ago
Other questions:
  • What is the slide sorter view used for?
    11·1 answer
  • In linear​ programming, choices available to a decision maker are called
    12·1 answer
  • In reduced visibility conditions you need to work especially hard to gather visual information because
    7·1 answer
  • In python:
    14·1 answer
  • You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules wi
    14·1 answer
  • User Interface Design ensures that the interface has elements that are easy to ________________. (Choose all that apply)
    10·2 answers
  • Which software programs should students avoid using to create and submit course work? (Choose all that apply).
    6·1 answer
  • . Which responsibility belongs to the marketing function?
    11·1 answer
  • Select all the correct answers
    11·1 answer
  • Which software development method uses highly skilled programmers to shorten the development process while producing quality sof
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!