How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50

Answers

Answer 1

Answer:

Create boxes with the following content

Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.

The check block has a diamond shape.

At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.

Connect the blocks using arrows.

Indicate the start and the end of the flow using the appropriate symbols.

The block to check if a number is a prime you could further decompose into the steps needed to do such a check.


Related Questions

Which of the following expressions would you use to test if a char variable named choice is equal to "y" or "Y"? a. choice.tolower = "y" || "Y" b. choice.tolower = "y" c. tolower(choice) = "y" d. tolower(choice) = "y" || "Y"

Answers

Answer:

choice.tolower == "y"

Explanation:

The tolower method is a string method in c# that converts all characters in a string to lowercase characters(if they are not already lowercase letters) except special symbols which remain the same example "#" symbol.

The tolower method does not take any arguments, therefore to use it, we simply chain it to our string variable(dot notation) and use a comparison operator "==" that evaluates to true or false based on whether the values returned on both sides are equal.

What is hacking? Why is hacking a concern for law enforcement?

Answers

Answer:

hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.

Hacking is having unauthorized access to data in a computer or a system. It's a huge concern because everything nowadays depends on the internet, and every device connected to the Internet is at risk

Give one example of where augmented reality is used​

Answers

Augmented reality is used during Construction and Maintenance

Service manuals with interactive 3D animations and other instructions can be displayed in the physical environment via augmented reality technology.
Augmented reality can help provide remote assistance to customers as they repair or complete maintenance procedures on products.

Answer

Medical Training

From operating MRI equipment to performing complex surgeries, AR tech holds the potential to boost the depth and effectiveness of medical training in many areas. Students at the Cleveland Clinic at Case Western Reserve University, for example, will now learn anatomy utilizing an AR headset allowing them to delve into the human body in an interactive 3D format.

it is also use in retail ,. Repair & Maintenance,Design & Modeling,Business Logistics etc

In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format specifier for variables of type float, if we want to output the floating point value, showing 3 decimal places?

Answers

Answer:

variable with a leading sign, three fractioned digits after the decimal point

In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics

Answers

Answer: demographics

Explanation:

Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.

The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.

It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.

hi, please help me, please help me.​

Answers

my day has been good
hope this helps

You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue.

a. False
b. True

Answers

Changing the resolution should work, it’s most likely true. :)

You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue is the true statement.

What is meant by resolution?

In order to cover the cost of the pixels on the horizontal and vertical axes, resolution is the total number of pixels individual points of colour on a display monitor.

The size of the monitor and its resolution affect how sharp an image appears on a display.

Thus, the statement is true.

For more details about resolution, click here:

https://brainly.com/question/14307212

#SPJ2

Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.

a. True
b. False

Answers

I’m sure the answer is true

A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit

Answers

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

Which terms means device that converts one voltage to another ?

Answers

Answer:

I believe it is an adapter

Explanation:

An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.

e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}​

Answers

Explanation:

double e-d/5.6;is wrong it should return to c

discribe two ways to zoom in and out from an image

Answers

Option 1: Spread your fingers on your laptop's trackpad.

Option 2: Press Command (or control) and the + sign.

Hope this helps!

Have a wonderful day!

what is IBM 1401 used for? Write your opinion.​

Answers

Explanation:

The 1401 was a “stored program computer,” allowing programmers to write (and share) applications loaded into the machine from punched cards or magnetic tape, all without the need to physically reconfigure the machine for each task.

Develop a c program to display the following input output interphase enter a number 5
The table of 5 is
5*1=5
5*2=10

Answers

Answer:

int main()

{

int number;

printf("Enter a number: ");

scanf_s("%d", &number, sizeof(number));

for (int i = 1; i <= 2; i++) {

 printf("%d*%d=%d\n", number, i, number * i);

}

}

Explanation:

I used the safe scanf_s() that takes a third parameter to indicate the size of the buffer. In this case it is the size of an integer.

Where does change management play a major role in transforming a client
business into a data-driven, intelligent enterprise?

Answers

To manage a modern IT environment characterized by hybrid complexity and exponential data growth — and to make that same IT a driver of growth and innovation for the business — you need to build intelligence into every layer of your infrastructure.

Change management plays a major role in transforming a client  business into a data-driven, intelligent enterprise in: data culture and literacy.

Data culture and literacy refer to all the processes involved in analyzing and understanding data within the framework of an organization.

The employees within such organizations are trained to read and understand data. It becomes a part of the organization's culture.

So data culture and literacy should be used when trying to transform a client  business into a data-driven, intelligent enterprise.

Learn more about data culture here:

https://brainly.com/question/21810261

1. Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the letters that make up the word can be arranged.
2. Convert the pseudocode in question one to JavaScript and test your program.

Answers

Answer:

1)Pseudocode:-

Prompt user to enter string

Pass it to combination function which can calculate the entire combination and can return it in an array

In combination method -

Check if the string is length 2 size ie of 0 or 1 length then return string itself

Else iterate through string user entered

Get the present character within the variable and check if the variable is already used then skip

Create a string from 0 to i the index + (concatenate) i+1 to length and recursive call combination function and pass this string and store end in subpermutation array

For each recursive call push character + sub permutation in total arrangement array.

2)Code -

function combinations(userStr) {

   /* when string length is less than 2 then simply return string */

   if (userStr.length < 2) return userStr;

   /* this array will store number of arrangement that word can be stored */

   var totalArrangements = [];

   /* iterate through string user enter  */

   for (var i = 0; i < userStr.length; i++) {

       /* get the current  character  */

       var character = userStr[i];

       /*check if character is already used than skip  */

       if (userStr.indexOf(character) != i)

           continue;

       /* create a string and concanete it form  0  to i index and i+1 to length of array   */

      var str = userStr.slice(0, i) + userStr.slice(i + 1, userStr.length);

       /* push it to totalArrangments  */

       for (var subPermutation of combinations(str))

           totalArrangements.push(character + subPermutation)

   }

   /* return the total arrangements */

   return totalArrangements;

}

/* ask user to prompt string  */

var userStr = prompt("Enter a string: ");

/* count to count the total number of combinations */

let count = 0;

/* call function the return tolal number of arrangement in array */

totalArrangements = combinations(userStr);

/* print the combination in console  */

for (permutation of totalArrangements) {

   console.log(permutation)

}

/* total combination will be  totalArrangements.length */

count = totalArrangements.length;

/*print it to console  */

console.log("Total combination " + count)

Output:-

explain how data structures and algorithms are useful to the use of computer in data management

Answers

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

Write a program that generates an array filled up with random positive integer
number ranging from 15 to 20, and display it on the screen.
After the creation and displaying of the array , the program displays the following:
[P]osition [R]everse, [A]verage, [S]earch, [Q]uit
Please select an option:
Then, if the user selects:
-P (lowercase or uppercase): the program displays the array elements position and
value pairs for all member elements of the array.
-R (lowercase or uppercase): the program displays the reversed version of the
array
-A (lowercase or uppercase): the program calculates and displays the average of the
array elements
-S (lowercase or uppercase ): the program asks the user to insert an integer number
and look for it in the array, returning the message wheher the number is found and
its position ( including multiple occurences), or is not found.
-Q (lowercase or uppercase): the program quits.
NOTE: Until the last option (‘q’ or ‘Q’) is selected, the main program comes back at
the beginning, asking the user to insert a new integer number.

Answers

Answer:

#include <iostream>

#include <cstdlib>  

using namespace std;

const int MIN_VALUE = 15;

const int MAX_VALUE = 20;

void fillArray(int arr[], int n) {

// fill up the array with random values

for (int i = 0; i < n; i++) {

 arr[i] = rand() % (MAX_VALUE - MIN_VALUE + 1) + MIN_VALUE;

}

}

void displayArray(int arr[], int n) {

for (int i = 0; i < n; i++) {

 cout << i << ": " << arr[i] << endl;

}

}

void main()  

{  

int myArray[10];

int nrElements = sizeof(myArray) / sizeof(myArray[0]);

fillArray(myArray, nrElements);

displayArray(myArray, nrElements);

char choice;

do {

 cout << "[P]osition [R]everse, [A]verage, [S]earch, [Q]uit ";

 cin >> choice;

 choice = toupper(choice);

 switch (choice) {

 case 'P':

  displayArray(myArray, nrElements);

  break;

 }

} while (choice != 'Q');

}

Explanation:

Here's a start. Now can you do the rest? ;-)

5. When you send your email to a bad address it may come back as a:
spam email
server email
bounced email
hypertext email
SAVE & E

Answers

Answer:

The answer is a bounced email

Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động

Answers

Answer:

gzvzvzvzbxbxbxb

Explanation:

hshzhszgxgxggdxgvdvsvzvzv

1011 0110 10102 = ?16

Answers

Answer:

B6A

Explanation:

I think you want to convert binary to hex.

Hexadecimal or "hex" is a numbering system which uses 16 different numerals. We saw that decimal used ten numerals from 0 to 9. Hex expands on this by adding six more, the capital letters A, B, C, D, E and F.

0...1...2...3...4...5...6...7...8...9...A...B...C...D...E...F

Steps to Convert Binary to Hex

1. Start from the least significant bit (LSB) at the right of the binary number and divide it up into groups of 4 digits. (4 digital bits is called a "nibble").

2.Convert each group of 4 binary digits to its equivalent

hex value .

3.Concatenate the results together, giving the total hex number.

An engineer is writing above the HTML page that currently displays a title message in large text at the top of the page . The engineer wants to add a subtitle directly underneath that is smaller than the title but still longer than most of the text on page

Answers

<!DOCTYPE html>

<html>

<body>

<h1>Heading or Title</h1>

<h2>Sub heading or sub title</h2>

</body>

</html>

This will be the html code for the given problem.

Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of old files, then writes and saves the document. Describe how the OS interacts with the disk to allow the new file to be written.

Answers

Answer:

Explanation:

In a situation like this, the OS erases the files from its core, and saves the document in its files compartment

The hard drive on Frankie's computer is completely full. In this case, the OS deletes the files from its core and saves the document in its files' compartment because it has to produce and save a new document.

What is a document?

Everybody has a distinctive signature, and signatures are crucial in proving that a person actually signed a document and accepted its terms.

An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.

Through a specified application program interface, the application programs seek services from the operating system (API)

Therefore, the OS will erase the file from the scratch and save it in a different folder.

To learn more about the document, refer to the below link:

https://brainly.com/question/14980495

#SPJ2

cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]

Answers

Answer:

please translate

Thank you✌️

Part 1 - Write the ingredients list to a file (10 points) Modify the program you developed for Lab 5 to make it output the data in the same format to a text file cake_ingredients_list.txt Note: Writing to a file is easier to code, so let's do that first. Hints: After the file has been opened, call the .write() function to write one line at a time to the file, in almost the exact fashion as calling print

Answers

Answer:

Explanation:

I do not have access to the ingredients list so instead I created the list and added the ingredients needed to make a cake. Then I used a for loop to loop throught the ingredients in the list and the .write() method to write the data to a text file with the same name as in the question. The code was tested and the output to the file can be seen in the attached image below.

ingredients = ['sugar', 'butter', 'eggs', 'vanilla', 'flour', 'baking powder', 'milk']

file = open('cake_ingredients_list.txt', 'w')

for ingredient in ingredients:

   file.write(ingredient + '\n')

Let a be an int array and let i and j be two valid indices of a, a pair (i,j) with i a[j]. Design a method that counts the different pairs of indices of a in disarray. For example, the array <1,0,3,2> has two pairs in disarray.

Answers

Answer:

Code:-

#include <iostream>

using namespace std;

int main()

{

   // take array size from user

   int n;

   cout << "Enter array size:";

   cin >> n;

   // Declare array size with user given input

   int a[n];

   

   // take array elements from user & store it in array

   cout << "Enter array elements:";

   for(int i=0 ; i < n ; i++){

       cin >> a[i];

   }

   

   /* ----- Solution Starts ----- */

   // i & j for checking disarray & count is for counting no. of disarray's

   int i=1, j=0, count=0;

   

   for(int k=0; k < n ; k++){

       

       if(a[i] > a[j]){

           // if disarray found then increament count by 1

               count++;

               

               }

               // increament i & j also to check for further disarray's

               i++;

       j++;

       }

       // Print the disarray count

   cout << "Pairs of disarray in given array:" << count;

   

   /* ----- Solution Ends ----- */

   

   return 0;

}

Output:-

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web research and develop a one-page description of the five most important things about HCI of mobile computing that the IT manager should know.

Answers

Answer:

phone grows everyday 82 percent

Explanation:

Describe the purpose of shell scripts. Provide one example to reflect the use of variables, constructs, or functions.

Answers

Answer:

Kindly check explanation

Explanation:

Shell scripts are used for writing codes which may involve writing together a complete set of task in a single script. These set if codes or instructions could be run at once without having to run this program one after the other on a command line. This way it avoid having to repeat a particular task each time such task is required. As it already combines a sequence of command which would or should have been typed one after the other into a compiled single script which could be run at once.

A shell script could be written for a control flow construct :

if [expression]

then (command 1)

else (command 2)

.....

What will be the pseudo code for this

Answers

Answer:

Now, it has been a while since I have written any sort of pseudocode. So please take this answer with a grain of salt. Essentially pseudocode is a methodology used by programmers to represent the implementation of an algorithm.

create a variable(userInput) that stores the input value.

create a variable(celsius) that takes userInput and applies the Fahrenheit to Celsius formula to it

Fahrenheit to Celsius algorithm is (userInput - 32) * (5/9)

Actual python code:

def main():

   userInput = int(input("Fahrenheit to Celsius: "))

   celsius = (userInput - 32) * (5/9)

   print(str(celsius))

main()

Explanation:

I hope this helped :) If it didn't tell me what went wrong so I can make sure not to make that mistake again on any question.    

Other Questions
Please,look at this one. Shown below is a piece of information on the sale of passenger vehicles that appeared in a newspaper. How many multi purpose vehicles were sold in the year 2006? Tira el baln con el pie.el bisbolel ftbolel baloncesto please help mee i will mark you brainliest Which expression is equivalent to (3a)2? Which of the following graphs best represents the solution to the pair of equations below?y = x + 6y = 2x 3 can i get some help on this question please? ASAP!! help me out .... I will mark u as brilliant students Given the following matrices, what 3 elements make up the first column of the product matrix DA? Which point is on the graph of f(x) = 3 4X? An expression is shown below:6x2y 3xy 24xy2 + 12y2Part A: Rewrite the expression by factoring out the greatest common factor. (4 points)Part B: Factor the entire expression completely. Show the steps of your work. (6 points) 1. When we watch TV in my house, my older brother always has the _________ in his hand.2. I always watch the news on TV3. It`s my favorite _____________________.3. If you want to see British television in my country, you need to install_________________.4. We have two TV_________________ in the house: a small one in the kitchen and a big one in the living room.5. I know someone who was on a _____________once. He answered all the questions correctly and won a big prize.6.Im watching a____________________about the Russian Revolution right now. The actors are great, and there are only According to an informal 1992 survey, the drinking water in about one-third of the homes in Chicago had lead levels of about 10 ppb. Dr. Koether lived in Chicago from 1996 to 1998. Assuming she drank 1.4 L of water a day, calculate the total amount of lead in mg (using one decimal place) that she was exposed to over the two years if she lived in a home that had such high levels of lead. DNA is referred to as a______, meaning that it hasstrands that are______together. Which expressions are equivalent to3(6+b) + 2b+1?Select 2 answers.Step 1 - Use the distributive property and pick your firstanswerStep 2 - Combine like terms and pick your secondanswer mention any four characteristic of present society Which of the following equations represents a line that is perpendicular toy = -4x+9 and passes through the point, (4, 5)?O A. y - 1x+6OB. y = x +5O C. y = *x+4D. Y = -4x+4 Marcia, Maureen, and Mario want to buy a $132 present for Sarah. Maureen is paying one half of Marcia's quantity, and Mario, one third of Marcia's quantity. Luckily for them the item has an 18% discountHow much is Mario paying? A soccer player stands at one corner of a field and kicks a soccer ball 95 yards to the opposite corner. If the field is 76 yards long, what is the width? please answer this question!!