The pseudocode to calculate the average of the test scores until the user enters a negative input serves as a prototype of the actual program
The errors in the pseudocodeThe errors in the pseudocode include:
Inclusion of unusable segmentsIncorrect variablesIncorrect loopsThe correct pseudocodeThe correct pseudocode where all errors are corrected and the unusable segments are removed is as follows:
start
Declarations
num test1
num test2
num test3
num average
output "Enter score for test 1 or a negative number to quit"
input test1
while test1 >= 0
output "Enter score for test 2"
input test2
output "Enter score for test 3"
input test3
average = (test1 + test2 + test3) / 3
output "Average is ", average
output "Enter score for test 1 or a negative number to quit"
input test1
endwhile
output "End of program"
stop
Read more about pseudocodes at:
https://brainly.com/question/11623795
Strategies of Green computing include:
Answer:
Equipment recycling, reduction of paper usage, virtualisation, cloud computing, power
Type the correct answer in the box. Spell the word correctly.
Which firewall monitors traffic from the DMZ to the LAN?
When a DMZ is set up using dual firewalls, the___
-end firewall monitors traffic moving from the DMZ toward the LAN while the ___
firewall monitors the traffic from the Internet toward the DMZ.
The firewall that monitors traffic from the DMZ to the LAN is the second, or internal (dual-firewall)
Which firewall manages traffic from the DMZ to the LAN?In this kind of traffic, the second, or internal, firewall is known to be the one that gives room for traffic to move from the DMZ to the internal network.
Note that the dual-firewall approach is seen as a very secure way due to the fact that two devices have to be compromised before any kind of attacker can be able to gain access into the internal LAN.
When a DMZ is set up using dual firewalls, the web server is placed inside the DMZ and the private network is often placed behind the DMZ.
Learn more about firewall from
https://brainly.com/question/13693641
"You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that apply"
The type of a file that is in apple.docx is Executable program file.
What is an executable file?An executable file (EXE file) is known to be a type of computer file that has a encoded sequence of codes or instructions that the system often work on when the user is said to clicks the file icon.
Note that Executable files are known to have an EXE file extension, and there are a lot of other executable file formats. The type of a file that is in apple.docx is Executable program file.
Learn more about Word document from
https://brainly.com/question/25567167
Most graphics software programs give you the choice to work in either RGB or CMYK. What are these specifications called?
A.
digital codes
B.
color spaces
C.
computer graphics
D.
artwork
Answer:B
Explanation:
How does a workstation differ from a server in terms of price processing power storage and computer memory
Workstations are laptops and PCs that quickly perform complex, technical tasks such as digital content creation and detailed analysis. Servers are software and hardware that store data, manage network resources, and fulfill client requests.
A set of activities that performs across the organization creating as output of values to the customer
a.
Business process
b.
Customer process
c.
Quality process
d.
Software process
e.
Integrated process
This week, we have covered network management which include topics such as System message log, SNMP, Netflow, QoS, VPN, and default gateway redundancy. Discuss one feature you would implement in your network and how you use it.
There are lot of system network. I would love to implement the use of VPN in my network.
What is a gains of implementing a VPN?The use of VPNs is one that helps a person to have a better form of total security, it also make performance better, remote access, anonymity, an others.
Conclusively, Note that the use of VPN can be affordable as it is cheap and it can prevent hackers having access to your data or system.
Learn more about VPN from
https://brainly.com/question/25554117
Develop a program to sort a file consisting of bonks details in the alphabetical order of author names. The details of books include book id, author_name, price. no of pages, publisher, year of publishing
Please provide C++ program for above question.
Use the knowledge in computational language in C++ to write the a code with alphabetical order of author name.
How to define an array in C++?An Array is a set of values arranged in lists and accessible through a positive numeric index. So, we have that each position of our Array is a variable of the type of our Array, so we have to have a way to initialize this set of variables.
#include <iostream>
#include <iomanip>
#include <fstream>
#include <string>
using namespace std;
struct Book {
string title;
string author;
};
const int ARRAY_SIZE = 1000;
Book books [ARRAY_SIZE];
string pathname;
ifstream library;
int LoadData();
void ShowAll(int count);
void ShowBooksByAuthor(int count, string name);
void ShowBooksByTitle(int count, string title);
void sortByTitle(int count, string title);
void sortByAuthor(int count, string author);
int main()
{
int count = 0;
char selector = 'q', yesNoAnswer = 'n';
string name;
string title;
cout << "Welcome to Forrest's Library Database." << endl;
cout << "Please enter the name of the backup file: ";
getline(cin, pathname);
LoadData();
count = LoadData();
cout << count << " records loaded successfully." << endl;
do
{
cout << endl << "\t(S)how All, Search (A)uthor, Search (T)itle, (Q)uit: ";
cin >> selector;
selector = toupper(selector);
switch(selector)
{
case 'S':
sortByTitle(count, title);
if (count <= 0)
cout << "No counts found!\n";
else
ShowAll(count);
break;
case 'A':
sortByAuthor(count, name);
cout << "bookAuthor: ";
cin.ignore();
getline(cin, name);
if (count <= 0)
cout << "No records found!\n";
else
ShowBooksByAuthor(count, name);
break;
case 'T':
sortByTitle(count, title);
cout << "bookTitle: ";
cin.ignore();
getline(cin, title);
if (count <= 0)
cout << "No records found!\n";
else
ShowBooksByTitle(count, title);
break;
}
}
while (selector != 'q' && selector != 'Q');
return 0;
}
int LoadData()
{
int count = 0;
int i = 0;
library.open(pathname);
ifstream library(pathname);
if (!library)
{
cout << "Cannot open backup file" << endl;
return 0;
}
while (!library.eof())
{
getline(library, books[count].title);
getline(library, books[count].author);
count++;
}
return count;
}
void ShowAll(int count)
{
for (int i = 0; i < count; i++)
{
cout << books[i].title << " " << "(" << books[i].author << ")" << endl;
}
}
void ShowBooksByAuthor(int count, string name)
{
int j = 0;
for (int i = 0; i < count; i++)
{
if(books[i].author.find(name) < 100)
{
cout << books[i].title << " " << "(" << books[i].author << ")" << endl;
j++;
}
}
cout << j << " records found";}
void ShowBooksByTitle(int count, string title)
{
int j = 0;
for (int i = 0; i < count; i++)
{
if(books[i].title.find(title) < 100)
{
cout << books[i].title << " " << "(" << books[i].author << ")" << endl;
j++;
}
}
cout << j << " records found";
}
void sortByTitle(int count, string title) {
string temp;
for (int i = 0; i < count; i++) {
for(int j = 0; j < count - i; j++) {
if (books[j].title > books[j + 1].title) {
temp = books[j].title;
books[j].title = books[j + 1].title;
books[j + 1].title = temp;
}
}
}
}
void sortByAuthor(int count, string name) {
string temp;
for (int i = 0; i < count; i++) {
for(int j = 0; j < count - i; j++) {
if (books[j].author > books[j + 1].author) {
temp = books[j].author;
books[j].author = books[j + 1].author;
books[j + 1].author = temp;
}
}
}
}
See more about C++ at brainly.com/question/19705654
Which method adds 10 to the right end of the array?
myArray.
insert
(10)
JavaScript has a set of mutator functions that allow you to modify the contents of an array without referencing the individual elements.To add to to myArray we us the push() method
Adding Elements to an ArrayTo add to to myArray we us the push() method
(10)
myArray.push(10)
There are two mutator functions for adding elements to an array: push() and unshift(). The push() function adds an element to the end of an array:
var nums = [1,2,3,4,5]; print(nums); // 1,2,3,4,5 nums.push(6);
print(nums); // 1,2,3,4,5,6
var nums = [1,2,3,4,5]; print(nums); // 1,2,3,4,5 nums[nums.length] = 6; print(nums); // 1,2,3,4,5,6
Learn more about arrays here:
https://brainly.com/question/24275089
It would be Array.append(10), so append is the answer.
Ensure that the Facilities worksheet is active. Enter a reference to the beginning loan balance in cell B12 and enter a reference to the payment amount in cell C12.
A reference value to the beginning loan balance in cell B12 is E6 ($325,000.00) while a reference to the payment amount in cell C12 is $B$6.
What is a spreadsheet?A spreadsheet refers to a document which comprises cells that are arranged in a tabulated format with rows and columns. Also, a spreadsheet is typically used in various fiedls for calculating, sorting, formatting, arranging, analyzing, and storing data on computer systems.
In this scenario, a reference value to the beginning loan balance in cell B12 would be E6 with a value of $325,000.00 while a reference value to the payment amount in cell C12 would be $B$6.
In conclusion, cell B12 will always show the beginning loan balance and cell C12 will always show a static payment amount for all the other cells in this spreadsheet.
Read more on spreadsheets here: https://brainly.com/question/4965119
6. Which of the following items is not a storage
medium?
A. Plotters
B. Zip disk
C. Hard disk
D. Memory stick
Answer:
Plotters
Explanation:
A 'plotter' is an external hardware device like a printer used with a computer to 'print vector graphics' - basically in english it no hold storage like that
what impact of information communication technology have on the environment about electronic waste, use of electricity?
Answer:
When e-waste is exposed to the heat, toxic chemicals are released into the air damaging the atmosphere.
Explanation:
1. What is TRUNC for Delphi
programming language?
Please explain in at least 200
words.
The Trunc function cut off a floating-point value by removing the fractional part. The Trunc function often brings back an integer result as it is not a real function.
What is the Trunc function in Delphi?When you look at the Delphi code, the Trunc function is known to be a fuction that reduces or cut off a real-type value and make it into an integer-type value.
Note that X is a real-type expression and so the Trunc is said to often brings back an Int64 value that is meaning the value of X approximated to zero and when the cut of value of X is not found in the Int64 range, an EInvalidOp exception is brought up.
Learn more about programming language from
https://brainly.com/question/8151764
Luke is working on a layout for a catalog. He adds cross lines on the four corners of the layout to mark out a small extra margin. What are these lines called?
A.
edge
B.
dark
C.
index
D.
trim
Cross lines that are added on the four corners of a layout to mark out a small extra margin is called: D. trim.
What is layout design?Layout design can be defined as a graphical design process that involves the use of one or more grids for the design of a catalog and system, so as to make the designs visually appealing to end users.
In a layout design, trim refers to the cross lines that are added on the four (4) corners of a layout to mark out a small extra margin.
Read more on layout design here: https://brainly.com/question/13732745
QUESTION
1.1 List 10 TEN advantages of word processing.
Quality : It produces error free documents. The spell and grammar check in word processing makes the document to be neat and error-free. We can get multiple copies of excellent formatted nature in word Processing.
! Storage of Text : We can take any number of copies with word processor. Not only that, if we need the same document with some slight changes, we need not type the same letter again. Just by making some slight changes, we can obtain a modified copy easily.Time Saving : We can get any number of copies of document in future without retyping. We can get the copy of document on any printer.
! Security : We can protect the documents in word processing by giving passwords. So there is a less chance of viewing the documents by unauthorized persons.
! Dynamic Exchange of Data : We can have dynamic exchange of objects and pictures from other documents into word processing documents. The documents can be linked to each other.
Improving Efficiency and Accuracy. Besides simply saving time, word processing offers ways to improve workers' efficiency and accuracy. Word processors contain software to automatically correct common errors and identify misspellings, improving overall speed and reducing
these may be some of them
Which of the following is a valid byte?
11100
11011011
00000000
10022011
Answer:
11011011
00000000
Explanation:
10022011 cant be an answer because bits are composed of 0s and 1s
and 11100 is too small.
A team member who does not feel comfortable disagreeing with someones opinion in front of the team would most likely come from a
Answer:
discussions and decisions made about public policy
Explanation:
6. Create lookup functions to complete the summary section. In cell I6, create a formula using the VLOOKUP function to display the number of hours worked in the selected week. Look up the week number in cell I5 in the range A17:G20, and return the value in the 2nd column. Use absolute references for cell I5 and the range A17:G20.
Answer:
Reporting period hours Timesheet Due Name 44260 Period Start 44228 Period End 40965 Summary Balances Date Completed 43722 Week # 1 Period Start Period End Worked
• Do you think documentaries are best delivered in media such as films or documentary?
• Do you think only thru survey can sustain authenticity of the information need within a study?
Answer:
I think documentaries are the best delivered in media format because it adds intrigue and lowers boredom.
I think surveys are nice for studies, but not good enough because people can click answers that they know to be false, at least, for them.
A desktop is one kind of computer. Name two other kinds?
Answer:
Notebook, supercomputer.
Explanation:
Notebooks are laptops, usually low performance.
Supercomputers are the best performing computers in the world.
Answer:
super computers and mainframe computers
Explanation:
these computers were used way before desktop computers
Which of the following is a characteristic of TIFFs?
universal standard for image file formats
cross-platform
the one version of TIFF that exists
only available as a vector graphic
please help
Answer:
What are the characteristics of a TIFF file?
A TIFF file supports grayscale as well as RBG,CMYK, and LAB color space. The format allows a color depth of up to 16 bits per color channel and is therefore ideal for data exchange during a RAW conversion. The abbreviation TIFF, or more rarely TIF, stands for “Tagged Image File Format”.
Answer:
universal standard for image file formats
An onsite technician at a customer site installed a PERC 10 card in an R630 server. The first time the server booted, the customer was unable to see the drives. The customer restarted the server a second time. This time, the server is not booting at all. An issue with the installation of an unsupported PERC card is suspected. What is the next best step to take?
The next best step to take in the situation above is to remove the failed card from the system and one can use a replacement card to see if the same issue will arise.
What is an IL PERC card?PERC is a term that connote Permanent Employee Registration Card. If a person holds this card, it is a card that shows that one have undergone some specific state and federal background checks and fingerprinting to function as a security guard in Illinois.
The Potential employers of security guards is one that needs applicants to have a PERC card and when the card fails, it may be due to the machine or faulty card or corrupt card.
Learn more about installation from
https://brainly.com/question/17506968
In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North America. They taxed goods such as sugar and tea and even placed a tax on the printing of documents. These actions angered the colonists, who thought that taxation was unfair since they had no representation in the British government. For this reason, a group of colonists dumped hundreds of chests of tea from Britain into Boston Harbor in 1773, in what became known as the Boston Tea Party. As a result, England passed a series of harsh new laws to punish the colonists, further angering them. The Continental Congress met to voice the colonists' grievances, and eventually, on July 4, 1776, the colonists declared their independence from Britain.
Answer:
Taxes and other laws imposed on the colonies led the colonists to declare independence from England.
Explanation:
During the British government, laws taxes, and other laws increased in the colonies which led the colonists to declare independence from England.
How colonists declared their independence from Britain?As a result, the British were forced to deploy a large army in North America on March 22, 1765, the British parliament passed the Stamp Act.
Which aimed to raise money by levying a tax on all legal and official papers and publications that were being distributed across the colonies. The Stamp Act angered the American colonists, which moved fast to oppose it.
A direct appeal to Parliament was virtually difficult due to the colony's extreme distance from London, the heart of British politics.
Therefore to raise money and increase taxes and laws colonists declared their independence on 4 July 1776 from Britain.
Learn more about the British government, here:
https://brainly.com/question/2848503
#SPJ5
The first three elements of the Continuous Delivery Pipeline work together to support delivery of small batches of new functionality which are released in accordance with what?
Answer:
is Market needs
Explanation:
The first three elements of the continuous delivery pipeline mediates the support to the small batches thereby to be released in accordance with the market demand.
What is continuous delivery pipeline?The continuous delivery pipeline can be given as the software application that enables the development of the new code with the automation to speed.
The first three elements of the continuous delivery pipeline are Continuous Exploration (CE), Continuous Integration (CI), and Continuous Deployment (CD).
The elements mediates the support to the small batches to be released in accordance with the market demand.
Learn more about continuous delivery, here:
https://brainly.com/question/14402781
#SPJ2
Define a function FindLargestNum() with no parameters that reads integers from input until a negative integer is read. The function returns the largest of the integers read
The FindLargestNum program is an illustration of function; where its execution is done when its name is called or evoked
The function FindLargestNumThe FindLargestNum function written in Python, where comments are used to explain each action is as follows:
#Thie defines the FindLargestNum function
def FindLargestNum():
#This gets the first input
num = int(input())
#This initializes the minimum value
maxm = num
#The following is repeated until the user enters a negative input
while num >= 0:
#This determines the largest input
if num > maxm:
maxm = num
#This gets the another input
num = int(input())
#This prints the largest input
print(maxm)
Read more about functions at:
https://brainly.com/question/24941798
It is possible to publish a presentation online. True False
Answer:
It should be true
Explanation:
I don't see why it wouldn't
Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false questions. Each correct answer is worth 2 points.
The quiz program is an illustration of loops and conditional statements
Loops are used to perform repetitionConditional statements are used to make decisionsThe quiz programThe quiz program written in C++, where comments are used to explain each action is as follows:
#include <iostream>
using namespace std;
int main(){
//This prints the instruction
cout<<"Enter T/t for True; F/f for False\n";
//This initializes the question
string questions[5] = { "Q1", "Q2", "Q3", "Q4", "Q5"};
//This initializes the correct options
char options[5] = { 'T','T','F','F','T'};
//This declares the user response
char opt;
//This initializes the score to 0
int score = 0;
//This loop is repeated 5 times
for (int i = 0; i < 5; i++){
//This prints the current question
cout << i + 1 <<". "<<questions[i]<<"\nAnswer: ";
//This gets the user response
cin>>opt;
//If the user response is correct
if(toupper(opt) == options[i]){
//The score is incremented by 2
score+=2;
}
}
//This prints the total score
cout<<"Score: "<<score;
return 0;
}
Read more about loops at:
https://brainly.com/question/19347842
If you determine that the hard drive is experiencing excessive use but the Windows Experience Index reports that memory is the system bottleneck, which component do you upgrade first: memory or the hard drive? Why?
The reason why is it is good to use an Upgrade memory is because low amounts of memory can lead to much use of the hard drive and based n the fact that it is not costly to upgrade memory than to upgrade the hard drive.
What is upgrading memory?This is known to b an act done so as to improve the performance of a computer.
It is often known as a RAM or system memory upgrade. An upgrade implies that one is adding memory modules along with the ones that were there or replacing the old ones. It is less costly when compared to hard drive upgrade.
Learn more about Upgrade memory from
https://brainly.com/question/13196228
You can always trust information that comes from websites ending in. . com
Answer:
No, Don't go there I can name more than 3 websites that end in ".com" that u cant trust.
Explanation:
In programming 2+6 is an example of what math
Answer:
[tex]beinggreat78~here~to~help.[/tex]
2 + 6 in programming is an example of math. It is the same as in the real world. Plus signs in coding are also a form of string concatenaction, the term used for combining two strings into one, or a variable into a string.