draw a flow chart to find the sum of two numbers

Answers

Answer 1

The answer is in the above attachment....

Draw A Flow Chart To Find The Sum Of Two Numbers

Related Questions

You took a picture of the beach, and there's a seagull sitting in the sand that you want to remove. What do you use to draw and AUTOMATICALLY remove the seagull, replacing it with more sand?

Answers

Answer: You can use a special type of editor to remove anything you want, and have that place filled in so its not blank space.

BUT: I am not sure of a specific one.

45 POINTS
PLS HURRY

An issue with the automated collection of personal information is _____. Select 2 options.

it does not yet collect data efficiently
it does not yet collect data efficiently

it processes highly sensitive data
it processes highly sensitive data

that people do not trust it enough
that people do not trust it enough

it may lead to inaccurate decisions
it may lead to inaccurate decisions

it uses robust security solutions
it uses robust security solutions

Answers

Answer:

2 - It processes highly sensetive data

4- it may lead to inaccurate decisions

Explanation:

It processes highly sensitive data and it may lead to inaccurate decisions.

What is automated collection?

The process of automatically collecting and aggregating data or information using computer systems, software, and algorithms without manual intervention is referred to as automated collection.

There are two options:

It handles highly sensitive information.It may result in poor decisions.

Automated personal information collection can process highly sensitive data such as medical records, financial information, or legal documents, which can jeopardise privacy and security if not properly safeguarded.

Furthermore, if the algorithms and models used to analyse the data are biassed or flawed, automated collection may result in incorrect decisions.

Thus, this can have serious ramifications, such as discriminatory outcomes or incorrect medical diagnoses.

For more details regarding automated collection, visit:

https://brainly.com/question/14680064

#SPJ3

Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode

Answers

Answer:

Network Sniffing

Explanation:

Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.

Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.

How is packet sniffing done?

Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.

Packet sniffing tools such as WireShark and SmartSniff are examples.

Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.

For further details about Packet Sniffing click here:

https://brainly.com/question/14417640

#SPJ4

how do I fix when it hits the second session it skips scanf.
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}

Answers

Answer:

scanf(" %c" ,&op); //entering operators such as + - \ *

Explanation:

put space before %c

______________ refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts while the ______________ refers to an inventory management technique where an incoming train unloads materials directly into outbound trucks.

Answers

Safety stock inventory management  refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts.

What is Safety stock inventory?

Safety stock inventory management is known to be a kind of more or extra inventory that is said to have been ordered way above the expected demand.

Note that this technique is often used to stop or hinder any form of stockouts that is said to have been caused by incorrect forecasting or unforeseen events in customer demand.

Learn more about Safety stock inventory form

https://brainly.com/question/26954616

How do you define a physics material?
A. As an object in the Hierarchy panel
B. All of these will work
C. As a component on a sprite
D. As an Asset that can be linked to a collider on an object

Answers

Answer:

as an object in the hierachy panel

What's better, adventure time or regular show?

Answers

Totally Regular Show!!!

Choosing what data to store and where and how to store the data are two key challenges associated with big data. true or false

Answers

Answer:True

Explanation:

how does salmon brown’s account compare to frederick douglass’s account? to what extent do they agree or disagree?

Answers

The  approaches of John Brown and Frederick Douglass had some similarities and differences. When compared,  the men were said to have fought for its eradication but were said to have used different drastic process.

They agree in terms of what they stood for but differs in terms of the approach used.

What is the role of the two men above?

Note that Douglass as a writer, orator, and statesman was said to have been focused on changing some of the policy.

While Brown on the other had is known to be  radical in nature , who was known to stand for violence. With the use of a small army, he was said to have pioneered some multiple rebellions and aided a lot of people escape bondage.

Learn more about bondage from

https://brainly.com/question/24513713

Which of these can be a problem for people with accessibility issues? Select 4 options.

using left-aligned text

using an image instead of text

using all uppercase text

putting two spaces after a period

flashing images

Answers

The option that has can be a problem for people with accessibility issues is flashing images.

What visuals can lead to seizures?

There are different kinds of Triggers. In television screens or computer monitors this issue can occur as a result of a  flicker or rolling images.

Note that some video games or TV broadcasts has rapid flashes or alternating methods of different colors and as such may have accessibility issues is flashing images.

Learn more about  accessibility issues  from

https://brainly.com/question/26848886

Answer:

using all uppercase text

putting two spaces after a period

using an image instead of text

flashing images

Explanation:

Those are the four answers.

what are computer networks​

Answers

Answer:

A computer network is a set of computers sharing resources located on or provided by network nodes. A computer network is a system that connects numerous independent computers in order to share information (data) and resources.

Explanation:

:)

Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx

Answers

Answer:

I'm doing my best to send you my answer,

Explanation:

The coding will be below

how do I upending friend request? 100 POINTS!!!!

Answers

Answer:

If you want to send a friend request, click on their picture. Then scroll down slightly. There should be 3 buttons. The first one says Thank you. The next one is human with a +. Click the 2nd button. That is how to send a friend request.

Explanation:

Have a great day!

#EquestriansLion

5. 16 LAB: Brute force equation solver

Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y = -1 have a solution x = 3, y = 2. Given integer coefficients of two linear equations with variables x and y, use brute force to find an integer solution for x and y in the range -10 to 10.


How do I write this in python?

Answers

Use the knowledge of computational language in python to write a code that force to find an integer solution for x and y .

How to find the solution of an equation in python?

To make it simpler the code is described as:

def brute_force_two_equations(first_values, second_values,

                             max_range=10, min_range=-10):  

for x in range(-10, 10, 1):

   for y in range(-10, 10, 1):

      if a * x + b * y == c and d * x + e * y == f:

          print(x, y)

else:

   print('No solution')

def equation(const1, const2, x, y):

   return const1 * x + const2 * y

def get_three_integers():

   inputs = []

   for i in range(0, 3):

       inputs.append(int(input("Please enter a value: ")))

   return inputs

if __name__ == "__main__":

   print("== First Equation ==")

   first_equation_values = get_three_integers()

   print("== Second Equation ==")

   second_equation_values = get_three_integers()

   solution = brute_force_two_equations(first_equation_values,

                                        second_equation_values)

   if solution:

       print(f"(x, y) {solution}")

   else:

       print("No Solution found")

See more about python atbrainly.com/question/22841107

starting a computer after it has been turned off is term as​

Answers

Answer:

Booting

Explanation:

Encoding in the information processing theory is the process of _____

Answers

Encoding in the information processing theory is the process of inputting of information into the memory system.

What is encoding?

Encoding is an act or a system method that is used in the inputting of information into the computer memory system.

It entails the storage in the retention of encoded information. After encoding is the Retrieval method that is the act of getting the information out of memory.

Learn more about encoding from

https://brainly.com/question/3926211

In information processing theory, encoding is the process of inserting data into a memory system.

What exactly is encoding?

Encoding is an act or a systematic method for entering data into a computer memory system.

It involves the storage and retention of encoded data. The Retrieval procedure follows encoding and is the act of retrieving information from memory. The process of converting thoughts into communication is known as encoding in information processing theory.

Learn more about encoding from this website.

brainly.com/question/3926211

#SPJ4

Provide a written response that: describes in general what the identified procedure does and how it contributes to the overall functionality of the program write your response here explains in detailed steps how the algorithm implemented in the identified procedure works. Your explanation must be detailed enough for someone else to recreate it. Write your response here provide a written response that: describes two calls to the selected function. Each call must pass different arguments that cause a different segment of code in the algorithm to execute

Answers

These exercises are about a descriptive essay or a descriptive text. The purpose of a descriptive text is to:

Inform; and guide the reader's precision.

What is a Descriptive Text?

As with every essay or text, your document must have the following:

An introduction (where you state the purpose of the text)The body (where the major description takes place)The conclusion (where you summarize and highlight cautionary instructions).

Usually, it helps to itemize, label, and number instructions.

Examples of Descriptive Texts are:

Standard Operating ManualsCar Manuals.

Learn more about Descriptive Texts at:
https://brainly.com/question/3530147

These activities are about writing a descriptive essay or text. A descriptive text's objective is to, Instruct and direct the precision of the reader.

What is the Definition of Descriptive Text?

The document, like any other essay or literature, must include the following:

a brief overview (where you state the purpose of the text)The body (where the major description takes place)The final word (where you summarize and highlight cautionary instructions).

It is often beneficial to itemize, label, and number instructions. Descriptive texts include the following:

Car Manuals and Standard Operating Procedures

Visit to learn more about Descriptive Texts:

brainly.com/question/3530147

#SPJ4

2. What are some other reasons why you might need to know the operating system version on your computer or mobile device

Answers

1. To check compatibility of an app/ software
2. To know the vulnerabilities
3. To be aware of available system updates
Hope that helps

To see if an app/software is compatible, to be aware of the flaws and be informed of system updates that are available are the some reasons to know the operating system version on computer or mobile device.

What is operating system?

An operating system is a software program that manages and operates computing device computers, laptops, smart watches, mobile phones.

It is the operating system that makes it unnecessary to know a coding language in order to interact with computers.

Thus, to check compatible, aware of flaws and it keep the updated about the software.

For further details about operating system, click here:

https://brainly.com/question/1763761

#SPJ4

What does Amara hope will
happen when Dad sits on the sofa?

Answers

Amara hope her  Dad will be comfortable using the sofa. Check more about sofa below.

What does sofa implies?

A sofa is known to be a type of long seat that is often made with arms and it also has a back rest. One can convert the sofa to a bed.

Conclusively, when Amara got the sofa for her dad, she hope that her dad will be comfortable using the sofa.

Learn more about sofa from

https://brainly.com/question/14791147

i really need the answer now!!

3. Which is the path through which an electric current flow? *
1 point
A. close circuit
B. electric circuit
C. parallel circuit
D. series circuit
4. Which of the following is a device that acts as an automatic switch that opens the circuit if too much current flows through it? *
1 point
A. battery
B. circuit breaker
C. switch
D. volts
5. Which statement is true about parallel circuit? *
1 point
A. All parts are connected in a single path.
B. Current flows through more than one path.
C. Same amount of current passes through each load.
D. One electrical device goes out, the rest will not work anymore.
6. Which of the following can cause electrical fire? *
1 point
A. Play with the switches.
B. Insufficient supply of current.
C. Excessive current may overheat the wires.
D. Turn off the appliances when nobody is using it.
7. How many volts of electric energy do the outlets in the Philippines commonly have? *
1 point
A. 50 to 100 volts
B. 100 to 150 volts
C. 110 to 150 volts
D. 200 to 220 volts
8. When a short circuit takes place, the fuse wires melt and break __________? *
1 point
A. battery
B. breaker
C. circuit
D. wires
9. Which of the following shows the proper way in using electricity? *
1 point
A. Use damaged appliances.
B. Use overloaded extension wires.
C. Turn off the lights when not in use.
D. Plug appliances when nobody left in the house.
10. Gemma ironed their clothes. She stopped it when she smells burnt wires. Why did she stop ironing the clothes? *
1 point
A. Check if the extension wire is in good condition.
B. Search any busted bulb or outlet.
C. Find the burnt wires.
D. All of these

Answers

Answer:

3. B.

4. B.

5. B.

6. C.

7. D.

8. C.

9. C.

10. D.

Explanation:

I hope I helped you.

PLEASE HELP! The variable initials is to be assigned a string consisting of the first letter of the string firstName followed by the first letter of the string lastName. Which of the following assigns the correct string to initials ?

Answers

Answer:

a

Explanation:

Prefix function will grab length character(s) from a string while concat function will join 2 strings into 1.

For initials, use prefix on firstName and lastName to grab the first character. Then join the two together using concat to give the initials:

So the answer is a.

The correct choice to the given function is "initials <--- concat (prefix (FirstName, 1), prefix (lastName, 1))", and its explanation as follows:

Prefix function:

To assign the correct string, we must examine the "cancat ()" and "prefix ()" methods in this problem.

The string consists of the first letter of the string "firstName" followed by the first letter of the string "lastName", is to be set to the variable initials.

Please find the attached file for the complete solution.

Find out more bout the prefix function here:

brainly.com/question/14912735

When much of her work was automated with a new computerized system, louisa became unsure of her ability to do her job. Nisa, her boss, has been mentoring her to improve her.

Answers

Answer:

self-efficacy

Explanation:

Nisa, her boss, has been mentoring her to improve her self-efficacy.

What is Computerized system?

DNA polymerases create a complementary DNA strand to the initial template strand during DNA replication, which is the process at its most fundamental level.

To produce a replication fork with two single-stranded templates, DNA helicases unwind double-stranded DNA before polymerases do. By using replication techniques, a single DNA double helix can be transformed into two DNA helices, which are subsequently split into daughter cells during mitosis.

The main enzymatic processes that take place at the replication fork are well conserved between prokaryotes and eukaryotes.

Therefore, Nisa, her boss, has been mentoring her to improve her self-efficacy.

To learn more about Self efficacy, refer to the link:
https://brainly.com/question/28215515

#SPJ6

40 points for this question
Digital citizenship focuses on _____. Select 3 options.

enforcing your rights on others

helping and leading others

targeting potential cybercriminals

creating positive online experiences

promoting the common good

Answers

Answer:

I think the answers are

the second one the third one the fourth one

hope it helps!

Digital citizenship focuses on the following:

B. helping and leading others

C. targeting potential cyber criminals.

D. creating positive online experiences

What is digital citizenship?

Digital citizenship is the ability of a person to learn and engage in digital relationships and learn how to use the system and parts of the digital system, like to use a keyboard, mouse, etc.

It also refers to the development of the skills related to digital communication, relationships, and how to practice dignity and respectful behavior on digital platforms.

The main focus of digital citizenship is helping other people to learn and grasp and be aware of cyber crimes and bullying and creating a positive environment.

Thus, the correct options are B. helping and leading others

C. targeting potential cyber criminals.

D. creating positive online experiences

To learn more about digital citizenship, refer to the link:

https://brainly.com/question/11542933

#SPJ5

python
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.
Ex: If the input is:
6
the output is:
110
The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.
def int_to_reverse_binary(integer_value)
def string_reverse(input_string)
main.py
# Define your function here.
if __name__ == '__main__':
# Type your code here. Your code must call the function.

Answers

The program illustrates the use of loops .

Loops are used for operations that must be repeated until a certain condition is met.

How to write the program?

The program written in Python, where comments are used to explain each action is as follows:

#This defines the int_to_reverse_binary function

def int_to_reverse_binary(integer_value):

   #This initializes the string output

   strNum = ""

   #The following loop calculates the string output

   while (integer_value > 0):

       strNum += str(integer_value % 2)

       integer_value //= 2

   #This passes the string output to the string_reverse function

   string_reverse(strNum)

#This defines the string_reverse function

def string_reverse(input_string):

   #This reverses the string

   strRev = input_string[::-1]

   #This prints the reversed string

   print("Binary number:",strRev)

# The main begins here

if __name__ == '__main__':

   #This gets the decimal value

   dec_val = int(input("Decimal value: "))

   #This calls the int_to_reverse_binary function

   int_to_reverse_binary(dec_val)

   

Read more about Python programs at:

https://brainly.com/question/24833629

Shelly uses Fac3book to interact with friends and family online. When is she most likely to express a positive mood on social media?

a.
Sundays
b.
Wednesdays
c.
Fridays
d.
Thursdays

Answers

Answer:

Fridays

Explanation:

On record, Fridays are preffered

The correct option is c. Fridays.

What is Social media?Social media refers to the means of relations among people in which they create, share, and/or interact with information and ideas in virtual societies and networks. In today's civilization, the use of social media has evolved into a necessary daily exercise. Social media is commonly used for social relations and credentials to news and information, and determination making. It is a valuable contact tool with others locally and worldwide, as well as to communicate, create, and spread announcements.

To learn more about Social media, refer to:

https://brainly.com/question/1163631

#SPJ2

Write a sub program to find the factors of a supplied number

Answers

Answer:

There are two options I can think of for you,

(Qbasic Code)

To Find the Factors of Given Number:

CLS

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END

To Find the Factors of Given Number Using COMMON SHARED:

DECLARE SUB factor ()

COMMON SHARED n

CLS

CALL factor

END

SUB factor

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END SUB

What is a search engine ​

Answers

Answer:

A search engine is a software program that helps people find the information they are looking for online using keywords or phrases.

Explanation:

Search engines are able to return results quickly—even with millions of websites online—by scanning the Internet continuously and indexing every page they find.

What happens when an auditory system and computing system are connected by abstraction?
A. They convert sound signals Into data that can be used to tell a device how to function.
B. They allow blological abstractions and computing systems to filter data.
C. They analyze data from both systems so only doctors can uno medical devices. D. They separate Input and output data from one another. ​

Answers

Answer:

It's A. They convert sound signals Into data that can be used to tell a device how to function.

Explanation:

Which discipline focuses on the design of computer hardware?

information technology

computer engineering

information systems

computer science

Answers

computer engineering

Answer:

Computer Engineering

Explanation:

People that work in the computer engineering field usually create hardware such as the CPU, PSU, RAM, GPU, SSD & a few more.

I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you will get a hefty point reward. Thanks :)

Answers

Answer:

I mean if your talking about games then just try Cool math I will give link in comments

Explanation:

Answer:

I have 4.

Explanation:

DOWNLOAD AVAST SECURELINE VPN. Get it for Android, iOS, Mac.

DOWNLOAD AVAST SECURELINE VPN. Get it for iOS, Android, PC.

INSTALL AVAST SECURELINE VPN. Get it for PC, Mac, iOS.

INSTALL AVAST SECURELINE VPN. Get it for Mac, PC, Android.

Have a great day!
#EquestrianLion

Other Questions
Why doesnt expelling students who are prone to violence really solve the issue of violence?A. It is an effective person-blame approach.B. It keeps schools safer, so it meets its goal.C. It puts potentially violent people into society.D. There is no way to keep all people from becoming violent. Which country was established to be apart of the Middle East in 1948,creating an issue with Palestinians?A. IsraelB. LiberiaC. Iraq I need help please. Thanks What is produced during cellular respiration?WaterCarbon dioxideEnergyAll of the above Which profitable colonial industry was king James l referring to The graph of the function f(x) = x2 is shifted 2 units up and 1 unit to the right. Which of the following corresponds to the shifted graph? A factory making many pairs of shoes in one day is an example of ________. Factor z3 + 2z2 - 9z - 18. (z - 3)(z + 3)(z + 2) (z 2 + 9)(z - 2) (z 2 + 2)(z - 9) write down everything that you know about heat temperature pressure and heat transfer Jake has 900 cm of material. He uses 14.5 cm to make a right triangular prism. He wants to make a second prism that is a dilation of the first prism with a scale factor of 4.How much more material does Jake need in order to make the second prism?Select from the drop-down menu to correctly complete the statement.Jake needs an additional (13.5, 28, 42.5) cm of material to make the second prism. This is the graph of a polygon. What is the approximate perimeter of the polygon?A:18.3 unitsB:20.5 unitsC:24.3 unitsD:28.5 unitsNO LINKS OR IMPROPER ANSWERS A company produces light bulbs each week. written in scientific notation, which is the best estimate of how many light bulbs the company will make in weeks? light bulbs light bulbs light bulbs light bulbs Plisss help with this oneeee The prism below is made of cubes which measure of 1/2 a foot on one side. What is the volume? Translate I need to ask into Spanish by filling in the missing letters:Y ee to Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and quantity sold how should she maintain the data A bag of marbles includes only green and red marbles. The results of an experiment are shown in the table below. What is the experimental probability of selecting red, or green? How do you write 7,100 in scientific notation Which of the following likely caused Japan to surrender? If the same object was taken to each of the planets, where would it weigh the most, and where would it weigh the least?