1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
earnstyle [38]
3 years ago
14

Write a pseudocode that receives a positive number from the user, and then,

Computers and Technology
1 answer:
Alik [6]3 years ago
5 0

Algorithm, pseudocodes and flowcharts are used as prototypes for a complete program.

<u>The pseudocode is as follows:</u>

input n

for i = 1 to n

  print("CS")

<u>The algorithm is as follows:</u>

1. Begin

2. Input number

3. For 1 = 1 to number

3.1     Display "CS"

4. End For

5. Stop

The following explanation of  the pseudocode can be used for algorithms and flowcharts

<em>This gets an </em><em>integer input </em><em>from the </em><em>user </em><em>(the </em><em>integer </em><em>represents the </em><em>number </em><em>of </em><em>times </em><em>to print "CS")</em>

input n

<em>This is </em><em>repeated n times</em>

for i = 1 to n

<em>This </em><em>prints "CS"</em><em> in each </em><em>iteration</em>

  print("CS")

See attachment for flowchart

Read more about algorithm, pseudocodes and flowcharts at:

brainly.com/question/21172316

You might be interested in
And there you go <br> sorry its saying my thing is tooo small
zaharov [31]

Answer:

Global knowledge is the answer

6 0
3 years ago
Read 2 more answers
Site won't let me log in and is glitching? Is rainly down?
yarga [219]

Answer: Somewhat.

Explanation: Try refreshing your pages, or reopening your browser.

3 0
3 years ago
Read 2 more answers
What is the multiplier effect, and how can you prevent if from happening?
nadezda [96]

Answer:

 The multiplier effect is the economical process that basically increase the final and national income disproportionately which results in the greater consumption as compared to the amount of the initial spend.

 In other words we can define as the capital implantation, regardless of whether it is in the legislative or corporate level, ought to have snowball impact in the monetary action.

It can be prevent by many ways by increasing the reserve ratio in the economical sector and by also increasing the taxes.

7 0
3 years ago
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
natali 33 [55]

Answer:

Option a: Trojan

Explanation:

A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.

However, Trojan cannot be replicated in the infected computer.

7 0
3 years ago
Read 2 more answers
What are the ethical implications of online social media after someone has died?
ZanzabumX [31]
<span>Think about the things people might have wanted private, but after death they have no control.</span>
8 0
3 years ago
Other questions:
  • Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
    15·1 answer
  • What is unique about being an administrative professional in a government job?
    8·2 answers
  • The algorithm credited to Euclid for easily finding the greatest common divisor of two integers has broad significance in crypto
    11·1 answer
  • Harold included an excerpt from an Internet magazine in an article he wrote for the school newspaper. However, he did not ask pe
    13·2 answers
  • Grooves and polished surfaces on desert pebbles are most likely caused by
    10·1 answer
  • Why are I/O (input/output operations) important in database environment?
    8·1 answer
  • Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correc
    9·2 answers
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • When preparing a technical document, do all of the following EXCEPT:_______.
    12·1 answer
  • How to stop sharing location without them knowing imessage.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!