1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
10

Write a pseudocode algorithm to ask the user to input the name of a student, the marks he/she received in a test and the worth o

f the test. Calculate the percentage mark the student received. Print the student's name and percentage the student received.​
Computers and Technology
1 answer:
Luda [366]3 years ago
4 0

Pseudocode algorithms are used as prototypes of an actual program.

The required pseudocode algorithm is as follows:

  • <em>Start</em>
  • <em>input name, score, test_worth</em>
  • <em>percent_score = score/test_worth * 100</em>
  • <em>print name, percent_score</em>
  • <em>Stop</em>

<em />

<em />

The first line begins the pseudocode algorithm

<em>Start</em>

The second line gets input for the student's name, score and the worth of the test

<em>input name, score, test_worth</em>

The third line calculates the percentage score

<em>percent_score = score/test_worth * 100</em>

The next line prints the student's name and the percentage score

<em>print name, percent_score</em>

The last line ends the pseudocode

<em>Stop</em>

<em />

<em />

<em />

Read more about pseudocode algorithms at:

brainly.com/question/21172316

You might be interested in
U.S. cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate net
Triss [41]

Answer:

Organized crime syndicates based in the United State

Explanation:

U.S. cybersecurity experts and government officials are increasingly concerned about breaches from organized crime syndicate based in the United States into corporate networks, either through mobile devices or by other means.

The crime syndicate can go to any length to access corporate network through mobile device or any other means in order to commit crimes that is why the US cyber security expert and government officials are increasingly concerned.

Cyber security specialists or expert in the US are been employed to protect information or data that the crime syndicate may want to gain access to by using different variety of techniques by critically monitoring the systems network for attempted breaches by the crime syndicates and then dealing with any of them that is found guilty.

5 0
3 years ago
What does it mean "Be Proactive"?
joja [24]

Answer:controlling a situation by making things happen or by preparing for possible future problems

Explanation:

4 0
3 years ago
Read 2 more answers
State three positive uses of the computer in the government sector​
WINSTONCH [101]

Well Here I got 4

1. Email Functions

2. Distributing Payments

3. Record Keeping

4. Direct Mail Promotions

<em>Have A great night!</em>

<em></em>

6 0
4 years ago
Local area networks use many of the same network technologies and the Internet, only on a smaller scale. Devices that access LAN
enot [183]

Answer:

Fill in the gaps accordingly in the order below.

Explanation:

-Controller

-Media Access Control

-Ethernet

- WiFi

-Mesh

-Password

-SSID

-Encryption

-Guest

-DHCP

-Key

-Low

5 0
3 years ago
One main advantage of CD-ROMs is that
Norma-Jean [14]
They can hold a lot of information is what you're looking for  , i can remember having this question back when i did my GCSEs <span />
6 0
3 years ago
Other questions:
  • To get a sense of your digital footprint, you should:
    15·2 answers
  • Under what driving conditions will 2019 Nissan LEAF’s available Rear Cross Traffic Alert (RCTA) warn the driver if a vehicle is
    11·1 answer
  • You use a __________________ tool to push wires into a keystone jack and cut off the end of the wires.
    7·1 answer
  • Soft skills are: A) Personal qualities, habits, attitudes, and social graces that make up a person B) Hereditary C) The ability
    5·2 answers
  • Write a C program to perform simple C arithmetic calculations. The user is to enter a simple expression (integer operator intege
    9·1 answer
  • Please help! In your own words explain the difference between a problem and an algorithm.
    13·2 answers
  • What could have made you redesign your plan? Select 3 options.
    6·1 answer
  • According to the video, which tasks do Police Patrol Officers perform? Select all that apply.
    15·2 answers
  • Natural language generation is focused on?
    10·1 answer
  • Write a C++ program to print name, age, class, school​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!