1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
3 years ago
15

Write a simple algorithm in pseudocode that asks the user their favourite colour and then agrees with their choice, quoting the

colour in the response.
Computers and Technology
1 answer:
olga55 [171]3 years ago
3 0

Answer:

i am still a beginner in this but i hope it helps.

  • add scanner object;
  • declare string FavColour;
  • print msg to ask user for input
  • scan input FavColour;
  • print msg (" your favourite colour is " + FavColour)

You might be interested in
In excel office How to create spreadsheets?​
Alenkasestr [34]

Answer:

Step 1: Open MS Excel. Step 2: Go to Menu and select New >> click on the Blank workbook to create a simple worksheet. OR – Just press Ctrl + N: To create a new spreadsheet. Step 3: Go to the spreadsheet work area.

8 0
3 years ago
If a user copies the formula D15 into D16, what would the formula read in D16?
ella [17]
=B16*C16 hope that helped
4 0
3 years ago
Read 2 more answers
If you want to share files on your computer with other Windows computers, what should you have installed and enabled on your com
Troyanec [42]

Answer: One Drive

Explanation:

5 0
3 years ago
What savings account has the best rate of return on his interest
NeX [460]

Ally.com is a great savings account.

8 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
3 years ago
Other questions:
  • When computers are connected and operate through one main computer, it is called a _________ network
    14·2 answers
  • In what ways are Outlook notes useful for personal or professional use? Check all that apply.
    13·2 answers
  • Allie needs to add a long row of numbers. She should enter a
    13·2 answers
  • Suppose your parents are planning to take you
    8·1 answer
  • How to drive more website traffic?
    11·1 answer
  • Limitations of the information systems used by tesco​
    7·1 answer
  • In a _____ network, each device on the network is attached to a central router. If the router fails, then the other devices will
    13·1 answer
  • In the 1880’s advancements in technology and processes made photography available to the general public. Who is considered the m
    12·1 answer
  • 5. In what ways is the human brain like a computer? In what ways is it different?
    15·2 answers
  • Do OBS mic filters apply everywhere? Such as discord and other apps similar. Or is it just on streaming?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!