1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NemiM [27]
3 years ago
14

Qbasic program to check whether the given number is odd or even​

Computers and Technology
2 answers:
Iteru [2.4K]3 years ago
6 0

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

andrey2020 [161]3 years ago
6 0

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END

You might be interested in
I need help please?!!!!!!!!!!
Debora [2.8K]

Answer:

Graduated Drivers License process

Explanation:

It gradually develops skills, just using logic. Hope it helped!

3 0
3 years ago
Read 2 more answers
Lets computer know what to do when it starts up...
Paha777 [63]

Answer: the answer would be the "Rom chip"

Explanation:

The rom chip controls all aspects of the computer, this is also known as "BIOS" or "basic input/output system"

5 0
4 years ago
15 POINTS! please help
Maksim231197 [3]

Answer:

1. Understand your audience

2. Add a header

3. Put a face to the name

4. Write a professional headline

5. Be contactable

6. Summarize your story

7. Showcase your experience

8. Let your network speak for you

Hoped this helped

8 0
3 years ago
Read 2 more answers
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
The term “digital divide” refers to the gap between
juin [17]
It is the gap between demographics and regions.
4 0
4 years ago
Other questions:
  • A company is a Microsoft 365 reseller. The company does not provide managed services or direct customer support. You need to pro
    10·1 answer
  • What cold, hard facts support your position?
    5·1 answer
  • Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he us
    6·2 answers
  • 7. The penalties for a first-time DUI charge include a fine of __________. A. up to $500 for a BAL of .08 to .15 B. $500-$1,000
    5·1 answer
  • sara has just started using the Internet. She would like to be more efficient . In 3-4, give sara some advice about how to be mo
    5·1 answer
  • 1. Scrieţi un program care citeşte un număr natural n şi determină produsul cifrelor impare ale lui n. De exemplu, pentru n = 23
    11·1 answer
  • Complete the sentence.<br> A ___ number is composed of only zeros and ones.
    8·1 answer
  • Who can add entries to value log
    8·1 answer
  • Long-term memory used by the computer:
    8·2 answers
  • Floating point values (real numbers that can handle up to 5 decimals)
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!