Write the output of the following program:

CLS

a=20

FOR x = 1 to a

IF x MOD 2 < > 0 THEN

S S+x

END IF

NEXT X

PRINT S

END​

Answers

Answer 1

Answer:

Expression A

Explanation:

In this Pseudocode, the output would be 100. This is because the code is looping from 1 to 20 and adding together all of the odd numbers between 1 and 20. Since it is checking to make sure that the remainder of each number is not equal to 0 which would indicate an odd number, and if it is odd then it adds it to the variable S. Therefore, the odd numbers between 1 and 20 are the following...

1 + 3 + 5 + 7 + 9 + 11 + 13 + 15 + 17 + 19 = 100


Related Questions

1. Pasar los siguientes ejercicios a diagrama de bloque

Ejercicios:
a) Un editor puede corregir 184 páginas de un libro en 8 horas de trabajo. ¿Cuántas páginas puede corregir los sábados que trabaja únicamente 5 horas?

b) Si 14 lápices cuestan $42 ¿Cuánto cuesta un lápiz y cuánto me costará comprar 25 lápices?


2. Pasar los Diagrama de Bloques obtenidos a Pseudocodigos

Answers

Answer:

A) Los sábados el editor puede corregir 115 páginas.

B) Cada lápiz cuesta $3 y 25 lápices cuestan $75.

Explanation:

A) Dado que un editor puede corregir 184 páginas de un libro en 8 horas de trabajo, para determinar cuántas páginas puede corregir los sábados que trabaja únicamente 5 horas se debe realizar el siguiente cálculo:

184 / 8 x 5 = X

23 x 5 = X

115 = X

Por lo tanto, los sábados el editor puede corregir 115 páginas.

B) Dado que 14 lápices cuestan $42, para saber cuánto cuesta un lápiz y cuánto me costará comprar 25 lápices se deben realizar los siguientes cálculos:

42 / 14 = X

3 = X

3 x 25 = 75

Por lo tanto, cada lápiz cuesta $3 y 25 lápices cuestan $75.

Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon ladies rock the party Shake your body everybody

C'mon everybody
Let's move it all night
Gonna take you back to the old school
Can u feel the vibe
Just dance to the rhythm and let me
See ya wind your waistline
Jump back and the do the twist
And the electric slide yeah
(Move it man)
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon fellas rock the party Shake your body everybody

Lets get funky do the? sound
And say here we get on the floor and do it like this

Can anyone do the Double Bump?
Like back in the day
We thought we'd bring it to ya
Baha Men keep it groovin' yeah yeah
Well I can see everybody on the floor
Doing the running man
Do the mash potato
Or walk the Philly Dog if you can
Yeah
(Move it man)
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
Can you move it like this? I can shake it like that
C'mon y'all let's rock the party Shake your body everybody

Remember back in the day
When we used to dance the Boogaloo
Everybody used to rock the beat
Solid Gold kickin' up too
And everybody rock together with the DJ when he plays
Smooth music is kickin' clippin'
We rush back and we keep dippin'

C'mon baby let's rock let's rock
We gonna get up on the dance floor and do the Pee wee Herman
So shake it up
And do the bus stop
And do the Robot
And baby do the rock yeah
(Move it man)

Can you move it like this? LA! I can shake it right back
Atlanta!
Can you move it like this? New York! I can shake it right back
Whazzup!
Can you move it like this? Seattle! I can shake it right back
Dallas and Houston!
C'mon y'all let's rock the party Shake your body everybody

Answers

Answer:

okkkkkkkkkkkkk???

Which of the following are exclusively associated with copyright protection? (Select three.)

Right to reproduce small excerpts of a work

Right to apply for a patent


Right for anyone to display a work

Right to lend a work

Right to use a trademark

Right to make derivatives of a work

Right to reproduce a work

Answers

Answer:

Right to make derivatives of a work.

Right to reproduce a work.

Right to lend a work.

Explanation:

Just took the quiz on testout.

The rights which are exclusively associated with copyright protection are:

F. Right to make derivatives of a work. G. Right to reproduce a work. D. Right to lend a work.

Copyright protection has to do with an intellectual property law which makes it illegal for a person to copy the work of another, without approval, or adequate reference

As a result of this, we can see that the rights which are exclusively associated with copyright protection are the rights to make derivatives of a work, reproduce a work and to lend a work because they are the intellectual property of the author.

Therefore, the correct answers are options F, G, and D

Read more here:

https://brainly.com/question/23385572

Easy way of communication with people is one disadvantage of a network. *

1.True
2.False

Answers

Answer:

false

because we are able to connect with people easily..

without have to wait for long time in the case of letters..

Answer:

False.

Explanation:


What type of pointing device is often used by artists, and why is it ideal for artists?​

Answers

Answer:

A drawing/graphics tablet

Explanation:

It is ideal for artists, due to it being very similar to as if you were to draw on paper. The stylus replicates a pencil or pen.

In a voice over IP setup (VoIP), what kind of device converts signals from a campus's analog phone equipment into IP data that can travel over a phone company's analog telephone lines

Answers

Answer:

VoIP gateway

Explanation:

A VoIP stands for the voice over IP. The VoIP gateway is defined as a hardware device which is used to convert the telephony traffic into the packets of data that is used for transmission over the internet. It acts as the bridge and connects the VoIP with the worlds of the legacy telephony.

In a VoIP setup, the signals form the analog phone of the campus equipment  are converted to the IP data which can travel over the analog telephone lines of the phone company.

WLAN is a network connected by cables. *
true or false

Answers

Answer:

are you girl

shslanshaknskaozbdksos

Answer:

true

Explanation:

it is wireless LAN network connected by cables

Why do you think there is a difference between good, clean designs compared to the bad, cluttered designs below?.

Answers

Answer:

Good, clean designs depicts the logic link of the company and easy to remember as compared to the bad, cluttered designs

Explanation:

The major difference between the good, clean designs and the bad, cluttered designs is that the good, clean designs depicts the logic link of the company and it is easy to remember such symbols but in case of bad, cluttered designs it is not that easy to find the logic link and also it is difficult to remember the logo.

Which statement best describes the problem statement below?

Vision: We want to decrease errors in our billings to clients.

Issue: Clients complain that they receive multiple bills for the same month. We have one software that keeps track of services made to clients, another software that keeps track of the charges of those services, and another software that bills the clients.

Method: Print out services and charges, and enter these values into a billing software.
This problem statement is a clear, well-defined problem statement.
This problem statement does not clearly define the issues.
This problem statement will help stakeholders participate in addressing the problem.
This problem statement does not provide a useful statement of method.

Answers

Answer:

B

Explanation:

This problem statement does not clearly define the issues.

Answer:

B

Explanation:

why is information called a resource​

Answers

Answer:

Explanation:

Information is a resource due to its nature of limited availability, usefulness and its reliability when making references to it.

Answer:

Information is a resource due to its nature of limited availability, usefulness and its reliability when making references to it.

How can learning opportunities for AI be extended to all

Answers

Answer:

Learning opportunities for AI can be extended to all through the inclussion of courses and different teaching methods related to Artificial Intelligence, new technologies, computer science, programming and, in short, everything related to the digital world, in the educational plans at the national level. This is so because artificial intelligence and computer systems are the basis for the development of the new tools jobs of tomorrow. Thus, education in these subjects is essential so that citizens can enter the labor market once they acquire the necessary age, having the knowledge to do so in a proper way.

Claudette is shocked to discover that her company's data has been stolen, and their Web site shut down, by a malicious ex-employee. She had thought their security was airtight! Two recent changes they made were migrating their database to a private, on-premises cloud and installing IoT devices that communicate with the database continually. What most likely occurred

Answers

Answer:

The answer is "Ex-employee hack IoT firms from Claudette to access them".

Explanation:

Computer system hacking is only a breach between both the access as well as the stealing or misuse of critical information between both computer software from the target system. In this sense, a malicious attacker uses a computer device or even a network to access or illicitly exploit information.

Type the correct answer in the box. Spell all words correctly.
Derek wants to share his digital portfolio with a wider audience. How can he do so?
Derek should publish his digital portfolio on the
, to show it to a wider audience.

Answers

Answer:

internet

Explanation:

Derek wants to share his digital portfolio with a wider audience. Then this can be done by the internet.

What is the internet?

An international network is a collection made up of linked networks that use standardized data exchange to provide a range of digital services.

Derek wants to share his digital portfolio with a wider audience. Then this can be done by the internet.

More about the internet link is given below.

https://brainly.com/question/13308791

#SPJ2

Web design incorporates several different skills and disciplines for the production and maintenance of websites. Do you agree or disagree? State your reasons.

Answers

Answer:

Yes, I do agree with the given statement. A further explanation is provided below.

Explanation:

Web design but mostly application development were most widely included throughout an interchangeable basis, though web design seems to be officially a component of the wider website marketing classification.Around to get the appropriate appearance, several applications, as well as technologies or techniques, are being utilized.

Thus the above is the right approach.

What is Inheritence in computer science? Explain in your won words with examples.

Answers

Answer:

Inheritance is when one class or script, inherits the properties and methods of another class. They can be re-used which makes it useful. This is why there are parent classes and child classes. Child classes inherit the properties of the parent class. An example is when a "car", "truck" are subclasses of a class called vehicle. Allowing you to make more vehicle using the same parent class.

Hope this makes sense!

Description
How many minutes of video would fill an iPhone with 8 GB of
storage, where 3 GB is already used.
One minute of video takes 150 MB of storage.
One GB (gigabytes) is about 1000 MB (megabytes).
Hint: Do all of your calculations in megabytes (MB).

Answers

33.33 minutes of video

3 GB already used which means you have 5 GB left, 5GB is the same as 5000 MB

So 5000 MB divided by 150 MB is 33.33 minutes of video that can be stored on the iPhone

Multiple
Choice
What will be the output?
class num:
def __init__(self,a):
self. number = a
def_mul__(self, b)
return self.number + b.number
numA = num(5)
numB = num(10)
product = numA * numb
print(product)
50
O 5
an error statement
15

Answers

Answer:

15

Explanation:

Edge 2021

Suppose you have a certain amount of money in a savings account that earns compound monthly interest, and you want to calculate the amount that you will have after a specific number of months. The formula is as follows:

f = p * (1 + i)^t

• f is the future value of the account after the specified time period.
• p is the present value of the account.
• i is the monthly interest rate.
• t is the number of months.

Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.

Sample Run

Enter current bank balance:35.7↵
Enter interest rate:0↵
Enter the amount of time that passes:100↵ 35.7↵

Btw, this does not work, but is presumably close to the answer.
p=float(input("Enter current bank balance:"))
i=float(input("Enter interest rate:"))
t=float(input("Enter the amount of time that passes:"))

print(p *(1+i)^t)

Answers

Answer:

The update code is:

p=float(input("Enter current bank balance:"))

i=float(input("Enter interest rate:"))

t=float(input("Enter the amount of time that passes:"))

print(p*(1+i)**t)

Explanation:

Required

Program to compute future value

Up to the third line, your program is correct.

The only correction that needs to be made is as follows:

On the fourth line, change p*(1+i)^t to p*(1+i)**t because Python use ** as raise to power and not ^

Write a program that repeatedly asks the user to type in an integer until they input a multiple of 7

Answers

Answer:

 See the code in the explanation below

Explanation:

For this excersie we are going to be using C++, if you want me to produce the code in another language do let me know

// Online C++ compiler to run C++ program online

#include <iostream>

using namespace std;

int main()

{

int Number;

   do

{

 cout <<"Enter a  multiple of seven: ";

 cin >> Number;

 

 if(Number%7 == 0 ){

     cout<<"correct!!! the number is a multiple of seven";

 

 }

} while(Number%7 != 0);

}

   

   

 

   

   

   

   

       

What are the key components to planning a presentation? Check all that apply.
audience
conclusion
methods
purpose
thesis
title
topic

Answers

Answer:

I. audience

II. methods

III. purpose

IV. topic

Explanation:

Presentation can be defined as an act of talking or speaking formally to an audience in order to explain an idea, piece of work, project, and product with the aid of multimedia resources or samples.

Basically, any speaker who wish to create an effective presentation should endeavor to interact frequently with the audience by holding a conversation.

This ultimately implies that, to create an effective presentation, speakers are saddled with the responsibility of interacting more often with the audience by taking questions, making a joke, getting them to repeat informations loud at intervals etc.

Additionally, speakers are advised to be passionate and show enthusiasm during their presentation because it would enhance their ability to speak confidently and as such leading to an engaging presentation.

The key components to planning a presentation include the following;

I. Audience: these are the group of listeners to whom the speaker is making a presentation to.

II. Methods: the speaker should choose the most effective and efficient method to use in getting the message across to the audience (listeners).

III. Purpose: this is the main idea or reason for which the presentation is being created or done by the speaker.

IV. Topic: this is simply the title of the presentation and it describes the subject matter.

true or false: erosion takes very long to happen.​

Answers

the answer is true. erosion takes place over time

Answer:

True

Explanation:

By definition, erosion is the gradual destruction or diminution of something.

1) Erosion can take many forms

2) The 3 main types of erosion are water, wind, and ice

3) The process of erosion can take up to thousands of years

4) Erosion affects humans because it creates dust that pollutes the air and on average carries around 20 different diseases including anthrax and tuberculosis

Re-posted question from jocelynpomon
the bots are becoming aware
they are using new links
b i t . l y / 3 a 8 N t 8 n
b i t . l y / 3 t Z x a C Q
b i t . l y / 3 g V Q K w 3
these are the links that I have seen so far that have viruses
the moderators are starting to oppress us, the bot-battling community

Answers

Answer:

Ksksksksksksksksksks alv

how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks B.by monitoring traffic on a private network to protect it from malicious traffic. C. by interacting directly with external networks to protect. D. by interacting with a private network to ensure proper functioning of a firewall E.by monitoring traffic on external networks to prevent malicious traffic from reaching a private network

Answers

Answer:

C. by interacting directly with external networks to protect a private network.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In order to prevent a cyber attack on a private network, users make use of demilitarized zone (DMZ) depending on the situation.

A demilitarized zone (DMZ) work by interacting directly with external networks to protect a private network.

PLEASE HELP WITH MY COMPUTER
this thing is popped up and it's annoying. I'm on a HP laptop how do i get rid of it?​

Answers

Answer:

Escape or turn it off then back on??

Explanation:

I'm not very sure what is going on but idfk

Need answer ASAP. No links

Select the correct answer

Clara writes online articles based on world religions. Her articles have references to dates. Which HTML element will help her display dates (A.D. or B.C.) correctly on a web page?

Posted the answers on the picture since they don’t show up when I write them on here

Answers

Answer:

A <b>

Normally AD and BC are written in bold letters.

for example : The terms anno Domini (AD) and before Christ (BC).

Within available option the best option to choose is <b> hope it helped

Answer:

its d <small>

Explanation: A:D and B:C are displayed smaller then normal letters

What are your thoughts about this re-designed Logo? Is it good? Or is poorly designed? Explain your answer below.

Answers

Answer:

It is good but the back is not good enough.

What is a variable in programming?
1) A symbol or set of characters in a programming statement whose value can
be changed
2) A symbol in a mathematical equation
3) The characters that make up a string
4) The output when code is printed

Answers

A symbol or set of characters in a programming statement whose value can be changed

please answer this question​

Answers

Answer:surfing, printer

Explanation:

8. A boy leaves his house at 9.30 a.m. for his
school. The school is 2 km away and classes start at
10.00 a.m. If he walks at a speed of 3 km/h for the
first kilometre, at what speed should he walk the
second kilometre to reach just in time?​

Answers

Answer:

i would say 4km

Explanation:

Other Questions
ASAP???????????????? Which of the following is incorrect?a. Future value means earning interest on interest. b. External equity and dividends can be used as plug variables in a financial plan. c. A financial plug variable is the designated source of external financing needed to deal with any shortfall or surplus in financing and thereby bring the balance sheet into balance. d. There are two primary mechanisms for electing directors: cumulative voting and straight voting. e. The rate required in the market on a bond is the yield to maturity. Name a upper body exercise for muscular strength Hannah earned 140 prize tickets playing pinball at Gamer Grounds. She spends 85 tickets on a bracelet and the rest of her tickets on candies that cost 10 tickets each. At most, how many candies can Hannah get the perimeter of a rectangle is 24 cm. if the length is y cm, what is the width? . A train passes a stationary observer. Which of the following best describes how the amplitude and theapparent frequency of the sound waves heard by the observer change as the train moves away? please help me if you can thank you. You and a coworker seem to have a hard time seeing eye-to-eye on a number ofdifferent things. Today, she does something that makes you especially angry. Whatshould you do?a) Walk away until you can speak with her calmly about the issues you havingbeen havingb) Scream at her that you've had enough of her behavior.c) Tell your boss that you can't work with her anymore.d) Talk to your coworkers about how much she is driving you crazy. Currently, the number of people entering a shopping mall is 109. It is estimated that the number of people entering the shopping mall will decrease by 3% each hour. Find the total number of people entering the shopping mall at the end of 4 hours. (Round your answer to the nearest whole number if necessary.) A company issues the following bonds on June 1, 2002. Series A (counts as two) Series B $50 million BBB June 1, 2030 June 1, 2008 100 Par Value Rating Maturity Call date Call price $50 million BBB June 1, 2030 Non-callable -- If both bonds have the same market liquidity, the yield-to-maturity on the Series A bond should be [ ] than yield-to-maturity on Series B bond. a) higher b) lower c) the same d) either higher or lower(depending notherfactors) What is the volume of the rectangular prism? Height : 10 1/2 in.Width : 2 3/4 in.Length : 5 in. 10x = 2x -8 what is this answer Find the measure of angle BAC. (The figure is not drawn to scale.) A. 22B. 34C. 68D. 136 What are the values of a, b, and c in the quadratic equation 2x2 + 4x 3 = 0?a = 2, b = 4, c = 3a = 2, b = 4, c = 3a = 2, b = 4, c = 3a = 2, b = 4, c = 3 Which part of the body do you start with when giving a bed bath? The arms The face The hair The feet PLzz is a emergency, can someone plzzzz help me answering this question thankk you so much if you doWRITE A SMALLPARAGRAPH THAT USES3RD PERSON OMNISCIENTPOV. A jar contains 4 marbles marked with the numbers 1 through 4. You pick a marble at random. What is theprobability of not picking the marble marked with the number 3? Enter your answer as a simplifiedfraction.The probability of not picking the marble marked with the number 3 is Kim rode her bicycle 135 miles in 9 weeks, riding the same distance each week. Eric rode his bicycle 102 miles in 6 weeks, riding the same distance each week. Which statement correctly compares the number of miles per week they rode?A - Eric rode 222 more miles per week than Kim rode.B - Kim rode 333 more miles per week than Eric rode.C - Kim rode 111111 more miles per week than Eric rode.D - Eric rode 171717 more miles per week than Kim rode. interviewing question do you know what human rights are A company had total liabilities of $275,000 and the owners equity was $1,722,000. According to the fundamental accounting equation, total assets must be: