1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alina [70]
3 years ago
14

How to write the algorithm to calculate the square of five numbers

Computers and Technology
2 answers:
ioda3 years ago
6 0

Answer:

1. A = 7 and B = 12 here...

2. A^2 = 49 thus final answer will have 9 at units place and 4 is carried to add later.

3. Given number multiplied by 'B' => 127*12 = 1524

4. A*B => 12*7 = 84

5. 1524+84 = 1608 ..... ( step 3 + step 4 )

6. 1608+4 =1612 .... (4 is carried as stated in step 2)

7. Now, 16129 is the answer... (From step 2 and 6)

Explanation:

Divide the number in two parts with one part containing only the number at unit's place say part 'A', and other part say 'B', containing the remaining number.

Now square the number at unit's place. The square will be one of these; {0,1,4,9,16,25,36,49,64,81}. The unit's place digit in this square is the unit's place digit in actual final answer.Write it in the answer. If the square of digit at unit's place is a two digit no like from 16 to 81 in above set; write only the digit at unit's place from this square in the final answer and carry the remaining digit.

Multiply the actual number to be squared by part 'B'(the remaining part than the number at unit's place as described in step 1 ).

Multiply the parts 'A' and 'B'.

Add results of step 3 with results of step 4.

Add the carried digit from step 2 to the sum in prior step, that is step 5.

Now write this sum before the number we wrote at unit's place of final answer in step 2.

This number we now obtain from step 7, is the square of our number.

Scilla [17]3 years ago
6 0

Answer:

1.Start Algorithm

2.Enter first number

3.Enter second number

4.Enter third number

5.Enter fourth number

6.Enter fifth number

7.Add five number

8.display five number / 2

9.Display result

10.End Algorithm

Explanation:

You might be interested in
____________ occurs when a provider does not support data export or when a provider's service is unavailable through others.
elixir [45]

Answer:

The correct answer to the following question will be Vendor Lock-In.

Explanation:

Vendor Lock-In: It is also known as Customer Lock-In. The Vendor Lock-In makes the costumer depends on services and products on the vendor. The costumers are not able to use another vendor without changing costs as it creates barriers.

Some ways to avoid Vendor Lock-In, these are as follows:

  • Design your application portable.
  • Keep watching vendor contracts.
  • Arrange both entry and exit with your vendor.

8 0
3 years ago
A media file refers to what kind of file? A. Clip art
prohojiy [21]

Waveform Audio (.wav) is a common file format. Created by Microsoft and IBM, WAV was one of the first audio file types developed for the PC. WAV files are defined as lossless, meaning that files are large and complete; nothing has been lost.

your answer will be

<h2><em><u>C; image</u></em></h2>
5 0
3 years ago
Read 2 more answers
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
grandymaker [24]
False because it might damage it more but if it was recommended by lots of people i mean the software then its true
6 0
3 years ago
Is it more costly to Andrew to go to graduate business school full time or part time if the tuition is the same for each? A. Par
andrezito [222]

Answer:

A. Part time

Explanation:

Since tuition is the same whether he goes part time or full time, in the long run he will end up paying tuition a greater number of times if he is a part time student.

4 0
3 years ago
Read 2 more answers
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers
Llana [10]

Answer:

Broadcast message

Explanation:

The network models like OSI and TCP/IP suites have standard layers and protocols that governs the communication of end devices in a network.

The TCP/IP suite model has four layers which are application, transport, internet and network access layers. The network access does the work of both the data-link and physical layer of the OSI model.

When the packet is encapsulated in a data-link header and trailer, and needs to be sent to another unknown host, a broadcast message is sent to all the computers in the network to retrieve the remote host address for a unicast transmission to take place.

3 0
3 years ago
Read 2 more answers
Other questions:
  • In order to make burger a chef needs the following ingredients one piece of chicken meat 3 lettuce leaves 6 tomato slices Write
    8·1 answer
  • What default length is used for the ospf dead interval?
    14·1 answer
  • Write a method called swapPairs that switches the order of values in an ArrayList of strings in a pairwise fashion. Your method
    9·1 answer
  • You are attempting to upgrade a Windows Server 2008 R2 server to Windows Server 2016 Standard. What must be done in order to acc
    5·1 answer
  • A provides legal protection for something an individual has created
    12·1 answer
  • In chapter 11, we finally learn how the book got its title. What is the sign of the beaver? Is that what you expected when you r
    13·1 answer
  • You’re configuring a Web-based intranet application on the WebApp server, which is a domain member. Users authenticate to the We
    13·1 answer
  • Which of the following tools enables a production mixer to sync audio and video?
    7·1 answer
  • Choose the type of collection described.
    9·1 answer
  • P.W. Singer jokes about how many people are using Wang computers. What point is he making with this joke?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!