Debug the following program.


REM "Program to generate 2 2 4 6 10. 16... up to 10th terms" CLS

A=2

B=3

For I=1 to 10

Display A; B;

A=A+B

B=A+B

NEXT X

END​

Answers

Answer 1

Answer:

The debugged program is as follows:

A=2

B=2

For I=1 to 10

PRINT A

TEMP = A

A=B

B=TEMP+A

NEXT I

END

Explanation:

First, the value of B should be changed to 4 (because the second term of the sequence is 2

Next, change Display to Print because Q-basic uses the print keyword to display output

The sequence is not properly generated. So, I update that part of the program to:

For I=1 to 10

PRINT A

TEMP = A

A=B

B=TEMP+A

NEXT I

Lastly, the loop is controlled by variable I (not X).

So change NEXT X to NEXT I


Related Questions

In what way do graphs and charts help in decision-making? Select the most important point.

A.
They identify errors in the data.
B.
They can be included in slideshow presentations.
C.
They reveal patterns in data.
D.
They automate calculations.
E.
They can be inserted into documents.

Answers

I think c. They reveal patterns in data.

Why are message board discussions moderated?

A.
to rectify spelling and grammar
B.
to delete irrelevant or offensive posts
C.
to facilitate communication between group members
D.
to ensure that discussions topics are interesting

Answers

A ibahg ninja idea a,c

Francesca wants to create a program that will produce the phrase “Hello, world” on the screen. Which of these functions should Francesca use?

Answers

Answer:

It would be print.

Explanation:

If you want to execute a function it should be print so it will show up in the output box.

Help! ASAP! 1 Question.........°○°​

Answers

Answer: I think D)?

Explanation: Or B)

Edwin owns a smart phone with a digital assistant. He frequently enquires on political, sports, and weather updates. The assistant recognizes the words and phrases and provides appropriate answers. What technology is used to make the assistant respond to Edwin

Answers

Answer:

Speech synthesis

Explanation:

Synthesized speech is the technology of production of the speech of humans artificially. The technology can be made use of in hardware and software products such as a speech computer which is used to perform speech synthesis

Another implementation of the synthesized speech technology is the text-to-speech (TTS) systems that are used for the conversion of speech into written text as the words are dictated.

Select all the correct answers.

John travels all over the country visiting various clients. He needs to access his documents and services on the go. Which of these technologies
allows him to access documents and software while on the move?

A:cloud computing
B: grid computing
C:mobile computing
D:green computing
E:virtualization

Answers

Answer:

acd

Explanation:

i cant explain

Answer:

A

C

D

Explanation:

Plato

what are the answers for these question?

Answers

Answer:

tbh u gotta give more points in order for me to solve that:)

Explanation:

An application programming interface (API) is ________. (1 point) the code the application software uses to take advantage of code written by others the currently active part of an application the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM

Answers

Answer:

an interface

Explanation:

(API) is an interface that defines interactions between multiple software applications or mixed hardware-software intermediaries.

Los organos de los sentidos perciben de la misma manera un estimulo?porque?

Answers

Espero que te ayude!!!!

which processor is compatible with an AM2+ socket

Answers

Answer:

Amd phenom x4 9950 black edition

Explanation:

If you are worried that team members will not keep sensitive information private, you could ask them to sign a ________ agreement.
A. Non-confidentiality
B. Security
C. Non-disclosure

Answers

Answer:

C

Explanation:

It has legal reproduction if you break it, many nannys that work for a famous person/people have to sign a non-disclosure before they're hired.

Andy is working on a project to build an accounting software program for his firm. He uses old programming modules that contained code to perform various processes and links them to create a complete system. Which approach does he apply to the program design?
A.
structured programming
B.
non-structured programming
C.
top-down approach
D.
bottom-up approach
E.
modular programming

Answers

Answer:

E.  modular programming

Explanation:

Andy is applying a design known as modular programming. This is basically a design in which the entire project is broken down into various parts known as modules. Each one of these modules performs a very different and unique task. As the modules are created they are linked together like pieces of a puzzle in order to form the entire project. This makes tackling a large project much easier and makes debugging problems much easier as well.

Match each of the following network types to its definition: I. HAN II. MAN III. LAN IV. PAN V. WAN A. confined to a small geographic location beyond the home B. services a residence C. used to communicate among devices near an individual D. covers a city E. a network that covers the greatest distance

Answers

Answer:

I. ===> B

II. ===> D.

III ===> A

IV ===>  C

V ===> E.

Explanation:

PAN is the smallest network. Then comes then HAN then LAN.

MAN covers a city and WAN covers the greatest distance.

Pleaseeee hellppp!!!!!

Answers

Answer:

credit card info and delivery address

Explanation:

Which occurs when private details of a class are hidden from other classes or parts of the program that uses instances of the class?
inheritance

polymorphism

encapsulation

operation overloading

Answers

Answer:

Encapsulation

Explanation: got it right

Answer:

Encapsulation

Explanation:

I took the quiz.

Why do people say badass

Answers

Answer:

ummm....

Explanation:

maybe they just think it sounds cool?

Badass is defined as something or someone cool or something or someone tough, rebellious or aggressive. Like for an example “yo look at my new motorcycle doesn’t it look badass (cool”

Chlorine has two naturally occurring isotopes that are 35cland 37cl, the accurate masses and abundance are 34.96 and 75.6%and 36.97 and 24.4% respectively calculate the relative atomic mass of cl.

Answers

[tex] \implies \huge \tt \underline \red{answer}[/tex]

Hlo

explain what the hexadecimal code in a MAC address represents

Answers

Answer:

An Ethernet MAC address consists of a 48-bit binary value. Hexadecimal is used to identify an Ethernet address because a single hexadecimal digit represents 4 binary bits. Therefore, a 48-bit Ethernet MAC address can be expressed using only 12 hexadecimal values.

Pascal system . write the program that will calculate the perimeter of a rectangle if its area is A (m²) and one of its sides has a length of B (m). A and B are entered from the keyboard.​

Answers

Answer:

The program in Pascal is as follows:

Program Perimeter;

Uses Crt;

Var

 Length : Real;

 Width : Real;

 Area    : Real;

 Perim : Real;

Begin

 Clrscr;

 Write('Area: ');

 Readln(Area);

 Write('Length : ');

 Readln(Length);

 Width := Area/Length;

 Perim := 2 * (Length + Width);

 Write('Perimeter: ' ,Perim:5:2,'.');

End.

Explanation:

This declares all variables as real

Var

 Length : Real;

 Width : Real;

 Area    : Real;

 Perim : Real;

The program execution begins here

Begin

This clears the screen

 Clrscr;

This prompts the user for Area

 Write('Area: ');

This gets input for Area

 Readln(Area);

This prompts the user for Length

 Write('Length : ');

This gets input for Length

 Readln(Length);

This calculates the width

 Width := Area/Length;

This calculates the perimeter

 Perim := 2 * (Length + Width);

This prints the calculated perimeter

 Write('Perimeter: ' ,Perim:5:2,'.');

This ends the program

End.

A network utilizes a network access control (NAC) solution to protect against malware. When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied. What is this process called

Answers

Answer: Posture assessment

Explanation:

Posture assessment, also refers to posture validation and it is when somw set of rules are applied to the posture data which then gives an assessment of the trust level which can be placed in th e endpoint.

Posture assessment has to do with how the system security is evaluated based on the applications and the settings.

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Workplace injuries can result in losses to an organization’s profits.

OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.

Every year, thousands of people die as a result of workplace injuries.

Using equipment safely is faster and makes work more efficient.

Answers

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

Answer:

B

Explanation:

Question 6 [10 marks] a) How does a company's use of information systems affect its corporate strategies? (7 marks) b) Provide an example. (3 marks)

Answers

Answer:

following are the responses to the given question.

Explanation:

The capability to successfully utilize IT is mutually dependent on its ability to execute strategic strategy and set business goals. The ability to compete more and more relies on the capacity of an organization of using technology. In the future, what a company wants to do will rely on what its technologies can do. It may be an example of a company investing in information technology that allows a company to manufacture new products or improve the efficiency of the distribution system to the corporation's economic efficiency.

In a school 50% of the students are younger than 10, 1/20 are 10 years old and 1/10 are older than 10 but younger than 12, the remaining 70 students are 12 or older. How many students are 10?

Answers

Answer: 10 students

Explanation:

Students younger than 10 = 50%

Students that are 10years old = 1/20 = 1/20 × 100 = 5%

Students that are older than 10 but younger than 12 = 1/10= 1/10 × 100 = 10%

Students that are 12 years or older

= 100% - (50% + 5% + 10%)

= 100% - 65%

= 35%

This means that 35% of the students are 12 years or older and we've been given the number as 70.

Let's say the total number of students is x. Therefore,

35% of x = 70

0.35 × x = 70

0.35x = 70

x = 70/0.35

x = 200

The total number of students is 200.

Therefore, the number of students that are 10years will be:

= 1/20 × 200

= 10 students

Therefore, 10 students are 10 years.

Sanjay has 38 blue beads. And 26 red beads. He needs 8 beads to make 1 wrist band. How many wristbands can Sanjay make if he uses all of his beads?

Answers

Answer:

8

Explanation:

In total, Sanjay has 64 beads. if you divide the 64 beads by the amount of beads it takes to make one band (8) the answer would be 8.

Answer:

make the top answer brainly

Explanation:

How do we calculate the BMI in python?
the formula is kg/m²

Answers

Answer:

height = float(input("Enter your height in m: "))

weight = float(input("Enter your weight in kg: "))

BMI = weight / (height/100)**2

print(f"You BMI is {BMI}")

Explanation:

The python code for calculating BMI is as follows -

height = float(input("Enter your height in m: "))

weight = float(input("Enter your weight in kg: "))

BMI = weight / (height/100)**2

print(f"You BMI is {BMI}")

Some conditions can also be added such as

if BMI <= 15:

   print("You are underweight.")

elif BMI <= 30:

   print("You are healthy.")

elif BMI <= 40:

   print("You are over weight.")

You are designing an ecommerce web application that will scale to hundreds of thousands of concurrent users. Which database technology is best suited to hold the session state in this example

Answers

Answer: Amazon DynamoDB

Explanation:

The database technology that is best suited to hold the session state in this example is the Amazon DynamoDB.

Amazon DynamoDB is a document database which helps in delivering high quality and fast cperformance at any scale. It can be used to scale to hundreds of thousands of concurrent users as it's multi-active, and has a durable database that has built-in security.

edhesive assignment 2: room area?

Answers

Explanation:

a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ')

print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))

a, b, c, d, e = input("A ="), input("B ="), input('C = '), input("D = "), input('E = ') print(float(a*b + sqrt(c**2-(a/2)**2) * a/2 * 0.5))

What is program?

The program is an illustration of functions. Functions are groups of code segments that are executed when called or evoked

The calendar program

The calendar program in Python, where comments are used to explain each line is as follows:

#This checks for leap year

def leap_year(y):

if y % 4 == 0:

return 1 else return 0

#This returns the number of days in the month

def number_of_days(m,y):

if m == 2:

return 28 + leap_year(y)

elif m == 1 or m == 3 or m == 5 or m == 7 or m == 8 or m ==10 or m == 12:

return 31

elif m == 4 or m == 6 or m == 9 or m == 11:

return 30

#This returns the number of days left in the month

def days(m,d):

dayList = [0,31,59,90,120,151,181,212,243,273,304,334]

return dayList[m-1] + d

#This returns the number of days left in the year

def days_left(d,m,y):

if days(m,d) <= 60:

return 365 - days(m,d) + leap_year(y) else:

return 365 - days(m,d)

#The main begins here

#This next three lines gets input for date

day=int(input("Day: "))

month=int(input("Month: "))

year=int(input("Year: "))

#This gets the choice from the user

menu=int(input("Press 1 to calculate the number of days in the given month.\nPress 2 to calculate the number of days left in the given year.\nChoice: "))

#This prints the number of days in the month

if menu == 1:

print(number_of_days(month, year))

#This prints the number of days left in the year

elif menu == 2:

print(days_left(day,month,year))

Read more about Python functions at:

brainly.com/question/14284563

#SPJ7

The complete part of the question will be:

Assignment 3: Chatbot

What the code for assignment 3: chatbot Edhesive.

Where do animators work?
How do companies use web sites?
What is an operating system?
What is a database?
What is an app?

Answers

1. Most animators work in big cities where movie and television studios, animation studios, software developers, and video game design firms are located.
2. I’m confused about this one.
3. An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. ... The dominant general-purpose desktop operating system is Microsoft Windows with a market share of around 76.45%.
4. A database is an organized collection of data, generally stored and accessed electronically from a computer system.
5. An app, which is short for "application," is a type of software that can be installed and run on a computer, tablet, smartphone or other electronic devices. An app most frequently refers to a mobile application or a piece of software that is installed and used on a computer.

Which statement best describes a database?

Select one:
a. A collection of related tables.
b. Tables that are in sequence.
c. Tables of related information.
d. A collection of tables.

Answers

I think it's a. A collection of related tables

Need answer ASAP!!!!

Answers

Hi,

I tried answering this. Lol. Look at the image.

Other Questions
Which statement about 214 is correct?O A. tan 214 < 0O B. sin 214 < 0O C. cos 214 > 0 "HOT PIZZA" is offering 20% discount on all its pizzaAli bought a pizza for 5.60 what was the original price find 3/5% of $90,000 Highlight the trait that best describes the character. Think FAST. 1. "I know the answer!" Maya shouted at her friend. "I'm not s****d!" honorable conceited oversensitive Anwer this questions plz ano ang ibig sabihin ng pang-angkop at pangatnig? make the mathematical expression and simplify.3 times the difference of 17 and 7 is divided by 5 is the statement true or false? plant cells have chloroplast, but no mitochondria? In the reaction below does water acts as the acid or as the base?H2S + H20 - HS1- + H30+ *O a. Neither, water is neutralO b. AcidO C. Base PLEASE HELP ASAP! tyvm in advance.1. Verbs like gustar. Answer the following questions with complete sentences. Record yourself speaking your answer. Each verb is conjugated like gustar.( Sentences are attached because of inappropriate word glitch??) if 3/5 of a number is 2 more than 2/3 of the same number, then what is the value if the square of the number Why is it important to have good phone etiquette why does hamlet want the actors to put on a play for him, with lines he will add? who ever gets this right will get a brainlest and a good rating What was the Triangle Trade?trade in slaves, sugar, and manufactured goods between Europe, Africa, and the Americastrade based on the supply of the big three resources from China: silk, spices, and porcelaintrade begun for the purpose of shutting out a particular nation's merchants and craftspeopletrade that began in China and went through India before reaching Europe or the Middle East PLEASE HELP (NO GOO GLE PLEASE) 20 POINTSHow does the global Proletariat achieve communism? Please help!!! DUE SOON!!YOU WILL GET 25 POINTS! HELP ASAP PLEASE 3 extra points if you get it right pls someone actually translate this story to EnglishI'm giving brainlist to the correct answer A bag contains 5 green marbles, 7 yellow marbles, 4 blue marbles, 6 pink marbles, and 3 purple marbles. If two marbles are chosen without replacement, find the probability of choosing a yellow marble, then another yellow marble. Give your answer as a fraction in simplest form.