1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
14

Write a pseudocode that receives a positive number from the user, and then,

Computers and Technology
1 answer:
Alik [6]3 years ago
5 0

Algorithm, pseudocodes and flowcharts are used as prototypes for a complete program.

<u>The pseudocode is as follows:</u>

input n

for i = 1 to n

  print("CS")

<u>The algorithm is as follows:</u>

1. Begin

2. Input number

3. For 1 = 1 to number

3.1     Display "CS"

4. End For

5. Stop

The following explanation of  the pseudocode can be used for algorithms and flowcharts

<em>This gets an </em><em>integer input </em><em>from the </em><em>user </em><em>(the </em><em>integer </em><em>represents the </em><em>number </em><em>of </em><em>times </em><em>to print "CS")</em>

input n

<em>This is </em><em>repeated n times</em>

for i = 1 to n

<em>This </em><em>prints "CS"</em><em> in each </em><em>iteration</em>

  print("CS")

See attachment for flowchart

Read more about algorithm, pseudocodes and flowcharts at:

brainly.com/question/21172316

You might be interested in
What is a single device that provides functionality of a printer, scanner, copy machine, and perhaps a fax machine called?
saw5 [17]
A device that provides all of the functionality listed in your question, would be a MFP (Multi-Fuction Printer)
4 0
4 years ago
A Windows user called the help desk to request that her local user account password be reset on her computer. The help desk tech
lara [203]

Answer:

C. The user had previously encrypted her data files and folders using EFS.

Explanation:

The most likely reason for the lost data files is that the user had previously encrypted her data files and folders using EFS.

7 0
3 years ago
A slide in Blake's presentation contained the following information:
deff fn [24]

Answer:

consistent phrasing is missing

Explanation:

If you will note carefully, the bullets are not in correct format. The model is missing. The correct one is as below.

Risks

The correct form of presentation is as below:

1. Risks

a. employees  

              a. physical illness

              b. mental illness

              c. death  

2. Customers  

              a.   complaints

              b.   downtime

3.  Benefits

However, the content seems to be complete now, and hence not anything else is required. And since its not something very tough to decide to go with, bite the bullet is certainly not an issue.  

3 0
3 years ago
Words or names defined by the programmer are called
polet [3.4K]
<span>Words or names defined by the programmers are called as programmer defined symbols or identifiers. These are called as variables which are just simple storage locations and making available for the program to use. No two variables are same in the code of the program.</span>
6 0
3 years ago
Write Python statements that correspond to the actions below and execute them (a) Assign integer value 3 to variable a. (b) Assi
snow_tiger [21]

Here is code in Python.

#integer value 3 assigned to variable a.

a=3

#integer value 4 assigned to variable v.

b=4

# the value of given expression a * a b *b will be assign to variable c .

c=(a*a)*(b*b)

Explanation:

First an integer value is assigned to variable "a".And then integer 4 is assigned to variable "b". Calculate the value of expression a*ab*b and assigned to variable "c". Here expression a*ab*b can also be written as (a*a)*(b*b).

5 0
3 years ago
Other questions:
  • Who defined the term crowdsourcing in a Wired magazine article?
    15·1 answer
  • Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is ente
    8·1 answer
  • When a module is executing what happens when the end of the module is reached?
    10·1 answer
  • How is communication within healthcare different than communication within other industries ?
    13·1 answer
  • Use the _______ command to center worksheets vertically and/or horizontally on a page.
    9·1 answer
  • Many websites (mostly online shopping sites), monitor a person’s Internet browsing behavior, such as the websites we often visit
    14·1 answer
  • What is the minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP add
    9·1 answer
  • HELP ASAP IF YOU KNOW PYTHON 2!!!
    15·1 answer
  • What is a current trend in ERP systems?
    12·1 answer
  • Dealing with stress and strong emotions centeral idea​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!