1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IceJOKER [234]
3 years ago
9

Write an algorithm to verify a number as even​

Computers and Technology
1 answer:
Zinaida [17]3 years ago
8 0

Algorithm to verify a number as even is given in the picture attached.

You might be interested in
An intruder with malicious intent breaks into an office and steals a hard drive
kakasveta [241]

Answer: data security

Explanation:

The company's authentication protocols and data encryption measures denotes data security.

Data security simply means protecting unauthorized people from having access to a particular data. This is done to prevent unauthorized access of important information or to prevent fraud. Some of the data security measures include data encryption, tokenization, hashing, etc.

4 0
3 years ago
Write a loop that displays all possible combinations of two letters where the letters are 'a', or 'b', or 'c', or 'd', or 'e'. T
nikitadnepr [17]

Answer:

The program to this question can be given as:

Program:

#include <stdio.h> //include header file.

int main() //defining main method

{

char i,j; //defining variable

for  (i='a'; i<='e'; i++) //outer loop for column

{

for (j='a'; j<='e'; j++) //inner loop for row

{

printf("%c%c\n",i,j); //print value

}

}

return 0;

}

Output:

image.

Explanation:

  • In the above C language program, firstly a header file is included. Then the main method is defined in this, a method contains a char variable that is "i and j". This variable is used in for loop, that is used to print the pattern.
  • To print the following patter two for loop is used the outer loop is used for print columns and the inner loop prints row.
  • In C language to print character, we use "%c" inside a loop print function is used, that prints characters.

3 0
3 years ago
Please help me idk I suck at this stuff ​
kap26 [50]
I would say the best clear answer is D, because A is a little bit unclear but I would say the best answer is D.

Why?

Mesh Topology is expensive considering more links as compared to Ring topology.


4 0
2 years ago
One of your co-workers has been issued a new smart card because the old one has expired. The co-worker can connect to the comput
Lady_Fox [76]

Answer:

The answer is "The global Address List (GAL) is publishes in the new certificates".

Explanation:

Describe the GAL with relate to smart card:

  • The GAL is a part of the outlook, that allows the users to make a group of mutual contacts and resources specified for your G Suite domain and searchable directory.  
  • It provides the main mail app, that offers you to make global contacts, and also provides basic contact, with the use of business shares global addresses with others.  In this process, the co-worker can change their smart card.
5 0
3 years ago
Fill in the blank to complete the sentence. -------------------- is used to store and process data over the Internet using compu
Trava [24]

Answer:cloud computing

Explanation:

6 0
3 years ago
Other questions:
  • Casual or informal group meetings are common. Here youcasually chat over tea, meet after work, or get together for purelysocial
    5·1 answer
  • For computers, which color is NOT a primary color
    13·1 answer
  • Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
    14·1 answer
  • Which domain refers to the equipment and data an organization uses to support its IT infrastructure. It includes hardware, opera
    15·1 answer
  • (Financial application: compound value) Suppose you save $100 each month into a savings account with the annual interest rate 5%
    8·1 answer
  • 1.Terry turned on his computer one day to find that all of the storage on his computer was filled up. Furthermore, there were ma
    6·1 answer
  • graphic designers can compress files in different formats . One of the formats ensures that the quality and details of the image
    7·1 answer
  • The table button is present in the ……… tab.​
    14·2 answers
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
  • SINCE I CANT SEE IT KANG LOOK
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!