1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korolek [52]
3 years ago
14

Write a pseudocode that receives a positive number from the user, and then,

Computers and Technology
1 answer:
labwork [276]3 years ago
4 0

Pseudocodes are false codes that are used to imitate the original program. The pseudocode is as follows.

<em>Begin</em>

<em>      input n</em>

<em>      for i = 1 to n</em>

<em>      print("CS)</em>

<em>End</em>

<em />

Begin: This indicates the beginning of the pseudocode

input n: This gets input for the positive number

for i = 1 to n: This iterates from 1 to the inputted positive number

print("CS): This prints "CS" n times

End: This indicates the end of the pseudocode

Read more about pseudocode at:

brainly.com/question/17442954

You might be interested in
Pradeep and his cousin went to the corner store to buy candy. His cousin paid and told Pradeep he could pay him back. "You owe m
NeTakaya

Answer:

"It is 80 cents"

Explanation:

In order to calculate how much this actually is, we would need to multiply this fraction by the value of a whole dollar which is 1. We can divide the fraction 4/5 and turn it into the decimal 0.80 which would make this much easier. Now we simply multiply...

0.80 * 1 = $0.80

Finally, we can see that 4/5 of a dollar would be 0.80 or 80 cents. Therefore Pradeep would answer "It is 80 cents"

8 0
3 years ago
How many people employed in the United States work in a job related to digital media?
polet [3.4K]
I feel like more people are employed in the united states more than ever
5 0
3 years ago
Write a python program to calculate the compound interest
Lemur [1.5K]

Answer:

initialPrincipal = float(input("Please enter your initial principal:"))

interestRate = float(input("Please enter your interest rate:"))

timePeriod = float(input("Please enter your number of times interest applied per time period:"))

elapsedPeriod = float(input("Please enter your number of time period elapsed:"))

finalAmount = initialPrincipal*(1 + interestRate/timePeriod)^(timePeriod*elapsedPeriod)

print("Your final amount would be:", finalAmount)

4 0
3 years ago
Which is an ipsec protocol that authenticates that packets received were sent from the source?
fiasKO [112]

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

6 0
3 years ago
Suppose that we pick the following three tuples from a legal instance of a relation S (S has 100 tuples in total). Relation S ha
AysviL [449]

Answer:

The correct answer is BC → A, A does not hold over S. we noticed the tuples (1 ,2 ,3 ) and (4 ,2 ,3) which can hold over S)

Explanation:

Solution

No, since in this case the instance of S is provided. so such particular dependencies are unable to breach through such instance, but unable to tell which the dependencies hold towards S.

A functional dependency holds towards only when a relation forms a statement regarding the complete allowed instances of relation.

8 0
3 years ago
Other questions:
  • The following program contains 6 errors. Correct the errors and submit a working version of the program. The corrected version o
    13·1 answer
  • Headphones are an example of _____.
    6·2 answers
  • The mean of a collection of data is located at the​ ______ of a distribution of data.
    12·1 answer
  • Dueto working at home, lack of interaction may result in ___________ professionalgrowth.
    14·1 answer
  • 50 pts. please help ! Explain briefly the role, responsibilities, and required background of the production designer of a film.
    12·1 answer
  • Consider a class ClassName whose methods are listed below. What class is it?
    13·1 answer
  • As John develops the agenda, he wants to put the name of the appropriate person next to the agenda item. Whose name would he put
    12·1 answer
  • Write a program to generate the following series 1, 3, 5, 7, 9, 11.................. 10th​
    10·1 answer
  • Kim is writing a sql query that will pull a list of customers with outstanding orders and the sales rep for each order. What sho
    11·1 answer
  • reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!