1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
2 years ago
13

Write pseudo code that performs the following: Ask a user to enter a number. If the

Computers and Technology
1 answer:
CaHeK987 [17]2 years ago
3 0
Answer:
BEGIN
INPUT N
IF N>0 AND N<10 THEN
OUTPUT "blue"
ELSE
IF N>10 AND N<20 THEN
OUTPUT "red"
ELSE
IF N>20 AND N<30 THEN
OUTPUT "green"
ELSE
OUTPUT "It is not a correct color option"
ENDIF
END.

Explanation:

You might be interested in
If you define CSS rules on a parent control, the rules will be inherited by all of the children widgets.
den301095 [7]

Answer:

<u><em>TRUE</em></u>

Explanation:

7 0
3 years ago
A _____ captures the pattern in a _____ and sends it to the computer, where special software translates the _____ into meaningfu
g100num [7]

Answer:

A bar code reader scanner captures the pattern in a barcode and sends it to the computer, where special software translates the pattern into meaningful data.

Explanation:

A barcode reader is a handheld device that captures and reads information that is contained in a bar code. It consists of a scanner, a decoder and a cable that connects the barcode reader into a computer. This scanner works by directing a beam or red light across the black and white elements of a barcode. This amount of light energy that is reflected back is measured and converted into electrical energy which is then converted into readable data by the decoder and forwarded to a computer.

4 0
3 years ago
In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
Virty [35]

Answer: The Boston Tea party was when American colonists dumped tea into the Boston Harbor because they were mad at the British for taxing their tea.

Explanation: This started the Revolutionary War because it was the first big act of wanting a revolution from the American colonists.

4 0
2 years ago
15. Write a program in python to read three numbers in three variables and swap first two variables with the sums of
ivann1987 [24]

Answer:

a = int(input("Enter first number: "))

b = int(input("Enter second number: "))

c = int(input("Enter third number: "))

a,b = a+b,b+c

print(a,b,c)

Explanation:

Assignments like this are easy in python, in the sense that no helper variables are needed!

4 0
3 years ago
List and briefly defined categories of security services.
Fynjy0 [20]
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
7 0
3 years ago
Other questions:
  • I need help answering these questions!
    11·1 answer
  • What's a sentence with the words trickle and resume in it? they can be in any tense. Thanku​
    5·1 answer
  • Is USA TestPrep a test-taking site that won't let you access other windows without kicking you off?
    13·1 answer
  • A domain name is used to: *
    15·1 answer
  • I used the app and my answers were still wrong??????how
    8·2 answers
  • Match the desired outcome to the appropriate action.
    6·1 answer
  • The terms Apps and Applications can be used interchangeably about software installed
    8·1 answer
  • 3. The following is a dump of a UDP header in hexadecimal format. 0045DF000058FE20 a. What is the source port number? b. What is
    15·1 answer
  • Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the exist
    12·1 answer
  • to provide for ecmascript compatibility in older browsers, you can use group of answer choices javascript shivs javascript shims
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!