1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
2 years ago
10

Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth o

f the test. Calculate the percentage mark the student received. Print the student's name and percentage the student received.​
Computers and Technology
1 answer:
Luda [366]2 years ago
4 0

Pseudocode algorithms are used as prototypes of an actual program.

The required pseudocode algorithm is as follows:

  • <em>Start</em>
  • <em>input name, score, test_worth</em>
  • <em>percent_score = score/test_worth * 100</em>
  • <em>print name, percent_score</em>
  • <em>Stop</em>

<em />

<em />

The first line begins the pseudocode algorithm

<em>Start</em>

The second line gets input for the student's name, score and the worth of the test

<em>input name, score, test_worth</em>

The third line calculates the percentage score

<em>percent_score = score/test_worth * 100</em>

The next line prints the student's name and the percentage score

<em>print name, percent_score</em>

The last line ends the pseudocode

<em>Stop</em>

<em />

<em />

<em />

Read more about pseudocode algorithms at:

brainly.com/question/21172316

You might be interested in
The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely
tatuchka [14]

Answer: Operational Manager

3 0
3 years ago
Read 2 more answers
In cell j6, enter a formula to determine the cost of gas if the customer chose that option as indicated in column i. if the cust
Alex73 [517]

Answer:

a t t i c

Explanation:

7 0
3 years ago
A ____ resembles a circle of computers that communicate with each other.
Sidana [21]

Answer:

ring network

Explanation:

In a ring network, the nodes are arranged in a circular pattern where each node is connected to two adjacent nodes. In this topology, any node can communicate with any other node via the intermediaries.

In comparison,

- in a star network every communication needs to pass through a central hub node

- in a bus, each node is connected to a shared linear communication bus.

- in a hierarchical network nodes are organized along a tree structure layout.

4 0
3 years ago
Which of the following statements about Java Class Libraries is false? Question 18 options: A) An advantage of using Java class
Novosadov [1.4K]

Answer:

D) Java class libraries are not portable

Explanation:

The Java Class Library (JCL) is an array of enthusiastically loadable libraries that Java applications can identify and refer to at run time. Since the Java Platform is independent of any particular operating system, applications can’t depend on any of the platform-native libraries.

The library is a massive collection and works of prebuilt classes that is distributed through the Java SE platform.

6 0
3 years ago
What is the size of the program counter for an avr that has a 1 kbyte rom capacity?
horsena [70]

Answer:

9 bits

Explanation:

 We all recognize 1 K bytes as =1024 bytes.  

And the storage medium used for program instructions are the non-volatile flash memories. The MCUs are always 8 bits, and a piece of the instructions revenues two or one 16-bit words. Besides we know program memory magnitude through the device name, and as an instance, the ATmega64x line emanates with 64KB of flash, and the ATmega32x line emanates with 32 KB. And there is nobody like off-chip program memory, and all of the codes that are being implemented by the AVR essentially be on the on-chip flash. However, this restraint is not ever applied to the AT94 FPSLIC AVR/FPGA chips. Also, you must know that AVR is a family of microcontrollers established by ATEL in 1996. It is a Harvard architecture type single-chip 8-bit RISC microcontroller. And it is supposed to be the first microcontroller which applied flash memory for storing the program They are heavily used in embedded systems.  

1k byte = 1024 bytes, However, if the program instruction takes 16 bits.  

And hence it only wishes 512.  

Here and now 512 = 10^9, and henceforth you necessitate 9 bits at minimum.  

excluding you can somehow paginate that (such as through one-bit pagination, you will be necessitating only 8 bits and so on.)  

Therefore the answer here = 9 bits.

5 0
3 years ago
Other questions:
  • Which word most strongly appeals to pathos?
    15·1 answer
  • What is a browser cookie?
    10·2 answers
  • The command for creating a PivotTable is found in the <br> tab.
    7·1 answer
  • Laura has identified the job she wants, the skills needed for the position, and the areas she needs to improve in order to get i
    10·1 answer
  • Using Task Manager, you discover an unwanted program that is launched at startup. Of the following items, which ones might lead
    7·1 answer
  • Tom Daniels, an employee of a telecommunications company, is developing software that would enable customers to activate value-a
    7·1 answer
  • You need to replace a broken monitor on a desktop system. You decide to replace it with a spare monitor that wasn't being used.
    15·2 answers
  • All organizations need good quality cybersecurity to ensure _____. Select 4 options.
    12·2 answers
  • A threat analyst is asked about malicious code indicators. Which indicator allows the threat actor's backdoor to restart if the
    6·1 answer
  • Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automob
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!