1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Butoxors [25]
2 years ago
6

Write an alogrithm to display the first ten even numbers​

Computers and Technology
1 answer:
sladkih [1.3K]2 years ago
4 0

Answer:

Step1:start

step2: enter the ten number

s3: if the number is divided by 2 then print even number

s4: otherwise print odd number

s5:stop

You might be interested in
ImmuneEarth, a research and development company, has "eradicate all diseases" as its motto. It has numerous departments that res
anastassius [24]

Answer:

Grid computing.

Explanation:

Grid computing is a study utilizing Immune Earth to test AIDS treatment because the following are the reasons that describe the answer is true about the scenario.

  • Grid computing seems to be a scattered network with a vast amount for systems linked to handle a difficult issue.
  • Systems can be linked straightly or through organized systems.

Other options are incorrect.

  • Green computing is not the correct answer according to the scenario because the usage of systems and its energy is socially safe and economically sustainable.
  • Trusted Computing is not the correct answer according to the scenario because it helps a part of information to show which os as well as program to be required to access this.
  • Edge computing is not the correct answer according to the scenario because it optimizes web apps as well as software programs while getting computation back to the information base.
4 0
3 years ago
Why is the Vietnam War referred to as The Living Room War
Vitek1552 [10]
Television reduced the space between the war and the person watching the TV. When the media showed the intensity and the chaos of the war, it helped turn people against it.
8 0
3 years ago
How does outlets generate electricity???
dimaraw [331]

Answer:

"a hole is connected to the wire that brings the electricity back to the breaker box. when you turn on a lamp, the hot part of the outlet allows electricity to flow" I got this info from Google.com

Explanation:

4 0
2 years ago
When a router fails to send messages in a timely fashion, this is a problem of the _____.
natima [27]
<span>network layer  

hope it helped</span>
4 0
2 years ago
Privacy a. is an absolute value so corporate interests cannot be considered when it comes to employee privacy. b. is guaranteed
zmey [24]

Answer:

C. Must be respected if we are to function as complete, self-governing agents.

Explanation:

<em>Privacy</em> is the boundaries that are set up to protect us against unwanted intrusion or interference, and it forms the basis of our interaction with the world.

<em>Privacy laws</em> are set-up to protect individuals from unwanted and unapproved access to privacy by individuals, organizations, and government. This is greatly adhered to in many countries.

To some extent, privacy is considered to overlap with security, because, when private information such as social security number, bank card details, account names, and details, etc. are accessed inappropriately, the individual's security is greatly compromised.

Therefore, privacy must be greatly respected if we are to function as complete, self-governing agents.

8 0
2 years ago
Other questions:
  • A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more
    5·2 answers
  • Which type of statement is used to communicate one’s feelings in a nonconfrontational manner?
    14·1 answer
  • How to reinstall windows 7 on my pc,without format,because i don't want to loose my data,and can u give me a windows 7 setup ple
    8·1 answer
  • Structured walk-throughs take place throughout the SDLC and are called _____ reviews, depending on the phase in which they occur
    9·1 answer
  • In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
    8·1 answer
  • Identify which statement explains why a programmer would break a logic problem into steps.
    13·2 answers
  • Write a program to randomly fill an array of float of 10 elements (use the rand() function and make sure to use #include ) in ma
    11·1 answer
  • Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2
    11·2 answers
  • Why do you think that network and telecommunications security careers are some of the fastest growing in the field of technology
    8·1 answer
  • Write a program that prints the sum of the even numbers and the products of odd numbers on the screen
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!