What must be done to translate a posttest loop expressed in the form


repeat:


(. . . )


until (. . . )


into an equivalent posttest loop expressed in the form


do:


(. . . )


while (. . . )

Answers

Answer 1

Answer:

num = 0

while (num < 50):

if (num is Odd)

print(num is Odd)

num = num + 1

num = 0

repeat:

if (num is Odd)

print(num is Odd)

num = num + 1

until (num>=50)


Related Questions

The primary purpose of a use case diagram is
Select one:
a. to uncover additional details such as attributes and methods of a class
b. to show the users interaction with the system
c. model the interaction between the system and its environment

Answers

The primary purpose of a use case diagram is to model the interaction between the system and its environment. Use case diagrams depict the functionality of a system from the user's perspective, focusing on the system's behavior as it responds to requests from the users or other external actors. They show the different use cases or scenarios that users can perform with the system and the actors that participate in these interactions. Use case diagrams are often used in requirements analysis and software design to help clarify and communicate the system's purpose and behavior. Option (c) correctly explains the primary purpose of a use case diagram.

Answer:

b. to show the users interaction with the system

Explanation:

A use case diagram is a type of UML diagram that shows the interactions between a system and the actors that use it. It is used to model the behavior of a system from the perspective of the users. A use case diagram does not show the internal details of the system, but only the interactions between the system and the actors.

The other options are incorrect.

Option a is incorrect because a use case diagram does not show the attributes and methods of a class. Option c is incorrect because a use case diagram does not model the interaction between the system and its environment.

Chris wants to view a travel blog her friend just created. Which tool will she use?

HTML
Web browser
Text editor
Application software

Answers

Answer:

i think html

Explanation:

Answer:

Web browser

Explanation:

What kind of bit is designed to pull itself through as it drill?
A.Spade bit
B. Carbide -tipped bit
C.twist bit
D.auger but

Answers

An auger bit is designed to self-feed and pull itself through as it drills into wood or other soft materials. Therefore, the correct option is (D) auger bit.

An auger bit is designed to pull itself through as it drills. This type of bit is often used for drilling holes in wood, where the self-feeding design helps to reduce the amount of effort required by the operator. The auger bit is typically long and cylindrical, with a threaded screw-like tip that helps to pull the bit into the wood as it rotates. As the bit spins, it bores out a hole in the wood, and the waste material is carried up and out of the hole by the spiraled flute design. Auger bits come in a variety of sizes and shapes, and they can be used for a range of applications, including drilling holes for dowels, bolts, and other fasteners. Overall, the self-feeding design of the auger bit makes it a useful tool for any woodworker or DIY enthusiast looking to drill holes quickly and efficiently.

For more such questions on Bit:

https://brainly.com/question/30176087

#SPJ8

In an IPv4 datagram, the fragflag bit is 0, the value of HLEN is 5 (Its unit is word or 32-bits ), the value of total length is 400 bytes and the fragment offset value is 400 (Its unit is 8 bytes). The position of the datagram, the sequence numbers of the first and the last bytes of the payload, respectively are

Answers

Answer:

i aint sure

Explanation:

If you have a PC, identify some situations in which you can take advantage of its multitasking capabilities.

Answers

Situation one: using multiple monitors for tutorials on one screen and an application on another

Situation two: using virtual desktops for separating school and personal applications

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

You manage the DNS servers for the eastsim domain. You have a domain controller named DNS1 running Windows Server 2016 that holds a standard primary zone for the eastsim zone. You would like to configure DNS1 to use forwarders for all unknown zones. You edit the DNS server properties for DNSl. On the forwarders tab, you find that the Use root hints if noforwarders are available option is disabled. You also find you are unable to edit the forwarders list.What should you do?A. Configure root hints on DNSl.B. Change the eastsim.com domain to an Active Directory-integrated zone.C. Enable recursion on DNSl.D. Configure conditional forwarders.

Answers

Answer:

..

Explanation:

...

Katy wants to make a call using her computer instead of a phone. Which device will she need to make the call?

Answers

Answer:

Katy will need a headset or a phone that has been verified by the computer

Explanation:

2. Write a C program that generates following outputs. Each of the

outputs are nothing but 2-dimensional arrays, where ‘*’ represents

any random number. For all the problems below, you must use for

loops to initialize, insert and print the array elements as and where

needed. Hard-coded initialization/printing of arrays will receive a 0

grade. (5 + 5 + 5 = 15 Points)

i)

* 0 0 0

* * 0 0

* * * 0

* * * *

ii)

* * * *

0 * * *

0 0 * *

0 0 0 *

iii)

* 0 0 0

0 * 0 0

0 0 * 0

0 0 0 *

2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional

Answers

Answer:

#include <stdio.h>

int main(void)

{

int arr1[4][4];

int a;

printf("Enter a number:\n");

scanf("%d", &a);

for (int i=0; i<4; i++)

{

for(int j=0; j<4; j++)

{

 if(j<=i)

 {

  arr1[i][j]=a;

 }

 else

 {

  arr1[i][j]=0;

 }

}

}

for(int i=0; i<4; i++)

{

for(int j=0; j<4; j++)

{

 printf("%d", arr1[i][j]);

}

printf("\n");

}

printf("\n");

int arr2[4][4];

int b;

printf("Enter a number:\n");

scanf("%d", &b);

for (int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  if(j>=i)

  {

   arr1[i][j]=b;

  }

  else

  {

   arr1[i][j]=0;

  }

 }

}

for(int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  printf("%d", arr1[i][j]);

 }

 printf("\n");

}

printf("\n");

int arr3[4][4];

int c;

printf("Enter a number:\n");

scanf("%d", &c);

for (int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  if(j!=i)

  {

   arr1[i][j]=c;

  }

  else

  {

   arr1[i][j]=0;

  }

 }

}

for(int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  printf("%d", arr1[i][j]);

 }

 printf("\n");

}

printf("\n");

return 0;

}

Explanation:

arr1[][] is for i

arr2[][] is for ii

arr3[][] is for iii

2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional
2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional

III. FILL-IN THE BLANK (five points each)
11. Open divided scales have scales going in
directions.
12. There are
groups of scales.
13. The open divided scales have an
unit preceding zero.
14. The triangular scale can have up to
different scales on one piece of plastic.
15. The mechanical inch is divided into
equal parts.

Answers

Jsjejshxjskksnxbfbsjchjsjens

"If an architecture has a move instruction with more than one word and at most one of the two operands may be an indirect memory reference, the minimum number of frames needed to run a process on this architecture is"

Answers

Answer:

6

Explanation:

An instruction set architecture (ISA) can be defined as series of native memory architecture, instructions, addressing modes, external input and output devices, virtual memory, and interrupts that are meant to be executed by the directly.

Basically, this set of native data type specifies a well-defined interface for the development of the hardware and the software platform to run it.

Also, the set of instructions that defines the computer operation to perform (operand specifier) such as the addition of memory contents to a register, conditional move is referred to as an opcode. Thus, the number of operands in an instruction is grouped with respect to the maximum number of operands stated in the particular instruction such as 0, 1, 2, 3, etc.

In a processor, the minimum number of frames needed by a process depends on its instruction set architecture (ISA), as well as the number of pages used by each instruction.

Hence, if an architecture has a move instruction with more than one word and at most one of the two operands may be an indirect memory reference, the minimum number of frames needed to run a process on this architecture is 6.

To include an online picture in a publication, navigate to the _____ tab.

Answers

Insert Tab.
Thank You!

Your professor is advising a new crowd-funding app for women's self-help groups (SHGs) in Latin America on their database architecture. This is the business requirement she has worked on: All campaigns belong to a SHG. An SHG must exist before a campaign is created, and when an SHG is deleted from the database, all its campaigns are deleted. SHGs always belong to a country, and a country must be added to the app before SHGs are added to it. Which of the following is true of the entities defined in the database? Select all that apply.

Question 6 options:

An SHG entity depends on a Campaign entity

A Campaign entity is a depend on the SHG entity

A Country is not dependent on the Campaign entity

An SHG entity is dependent on a Country entity

A Campaign is an Independent entity

Answers

Based on the given information, the following statements are true:

An SHG entity depends on a Country entity.A Campaign entity is dependent on the SHG entity.

What is a country entity?

In the context of database design, a country entity refers to a logical representation of a country within a database system.

It typically stores information related to countries, such as their names, codes, demographics, or any other relevant data.

The country entity serves as a reference point for other entities in the database, such as self-help groups (SHGs) or campaigns, allowing for proper organization and association of data within the system.

Learn more about Entity at:

https://brainly.com/question/29491576

#SPJ1

How might the use of computers and knowledge of technology systems affect your personal and professional success?

Answers

People with little to no knowledge on how to use technology or a computer now a days will affect your role in society work majorly. Learning how to use photoshop or use a computer like powerpoint comes in handy when your going to a presentation, you don’t see people use boards anymore.

Most places are discussed as security updates true or fals

Answers

Most places in ios are discussed as security updates is false.

What is security updates

While it's crucial to keep iOS devices secure by updating security measures, the majority of conversations about iOS tend to revolve around its features, capabilities, and overall user satisfaction.

Updates aimed at bolstering the security of iOS devices generally involve an extensive array of measures, including patches, bug fixes, and fixes for potential system vulnerabilities. Periodic updates are issued to maintain the continuous security and stability of iOS gadgets.

Learn more about security updates from

https://brainly.com/question/30752691

#SPJ1

Most places in ios are discussed as security updates true or fals

You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The ISP has installed a connection to both RJ45 jacks on the wall plate. You are responsible for selecting the correct router to connect the network to the internet. You want to use the fastest connection speed available while providing for security for both the Home-PC and Home-PC2 computers.

Your task is to complete the following:

⢠Use the appropriate network components to connect the two computers to the new ISP.
⢠Place the Ethernet router with firewall capabilities on the Workspace.
⢠Use the existing Cat5e Ethernet cables to connect the computers to the router's integrated Ethernet LAN ports.
⢠Use the AC to DC power adapter to plug in the device.
⢠Use the Network and Sharing Center on both computers to confirm that the computers are properly connected to the network and internet.

Answers

Home pc1 becouse it is the right one

Find out about the different technological solutions available for interconnecting LANs to from larger networks such as wide area networks (WANS) and Metropolitan area networks. Consider the solutions for wired and wireless networks separately.

Answers

The different technological solutions available for interconnecting LANs to from larger networks are:

Ethernet Wi-Fi

What technology is used by wide area network?

The use of WAN Connections and Technology is known to be often used in wide areas or places.

Note that Wired WANs makes use of broadband internet services and also the use of multiprotocol label switching (MPLS) in traffic flow control  and network speed up process.

Note also the use of wireless WANs  such as 4G/5G and Long-Term Evolution (LTE) networks can help interconnecting LANs to from larger networks.

Learn more about LANs from

https://brainly.com/question/8118353

#SPJ1

Which of the following uses graphic symbol to depict the nature and flow of the process? *
1 point
A. FLOWCHART
B. PROCESS
C. CONDITION
D.ARROW LINE​

Answers

Answer:

Flowchart.

Explanation:

It is literally in the name. "flow of the process" -----> Flowchart.

A graphic symbol is a written symbol used to represent speech. A commonly known graphic symbol is an arrow which is used in flow charts to depict the nature and flow of the process.

Please help its due on May 14th. The code has to be in python.

Please help its due on May 14th. The code has to be in python.
Please help its due on May 14th. The code has to be in python.

Answers

An example of a Python function that reverses a list:

def reverse_list(lst):

   return lst[::-1]

How to use this Python function

To reverse a list, simply provide it as an input to this function, which will perform the reversal and give you the modified list.

Here's an example of usage:

my_list = [1, 2, 3, 4, 5]

reversed_list = reverse_list(my_list)

print(reversed_list)

The Output

[5, 4, 3, 2, 1]

The reverse_list function utilizes list slicing with a step value of -1 in lst[::-1] to invert the order of items in the list. A new list is formed with the elements arranged in the opposite order.


Read more about Python function here:

https://brainly.com/question/18521637

#SPJ1

50 POINTS Type the correct answer in the box. Spell all words correctly.
What should the timing of transition slides be per minute?
Maintain the flow of the presentation to
slides per minute.

Answers

The timing of transition slides during a presentation depends on various factors, such as the purpose of the presentation, the type of content being presented, and the audience's attention span.

What should the timing of transition slides be per minute?

The timing of transition slides during a presentation depends on various factors, such as the purpose of the presentation, the type of content being presented, and the audience's attention span. In general, the timing of transition slides should be approximately 1-2 seconds per slide, which translates to about 30-60 slides per minute. This pacing allows the audience enough time to read and understand the content without getting bored or losing interest. However, it's important to remember that the timing should be adjusted based on the complexity of the information being presented and the audience's engagement level. Additionally, it's important to ensure that the timing of transition slides doesn't feel rushed or too slow, as this can impact the overall effectiveness of the presentation.

Learn more about slides in: https://brainly.com/question/20777311

#SPJ1

a student received a poor grade on her last two language art tests. what are the steps she should take for solving this problem
PLEASE HURRYYYY!

Answers

Answer:

Study and do practice tests

Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.

Answers

The three genuine statements almost how technology has changed work are:

Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.

With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.

Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.

Technology explained.

Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.

Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.

Learn more about technology below.

https://brainly.com/question/13044551

#SPJ1

Jamal wants to download a software program that is free to use. What should he do?

Jamal should download the software from ??? and should then ???.
The Free website] install the software]
a reputable website] scan the download for viruses]
the first pop-up] copy the download on a flesh drive]

please just please help me

Answers

Answer:

The Free website] install the software]

a reputable website] scan the download for viruses]

THIS is the correct answer I think

Write a program to find 40%, 50%
and 60% of the input number.

Answers

inp = int(input("Enter a number: "))

print("%40 of this number is",(2*inp)/5,"\n%50 of this number is",inp/2,"\n%60 of this number is",(3*inp)/5)

Write a program to find 40%, 50%and 60% of the input number.



Select the WRONG statement about Slide Transitions.

a. Slide transitions can be considered a different type of animation.

b. Each and every slide in PowerPoint should have a slide transition.

c. You can apply slide transitions to only a few selected slides.

d. You can apply slide transitions to every slide in a presentation

Answers

Answer:

c. You can apply slide transitions to only a few selected slides.

Explanation:

If you want to, you could literally apply slide transitions to every slide.

C

You can apply slide transitions to any amount of slides you wanted

what is the meaning of Ram?​

Answers

Answer:

Random-Access Memory

Explanation:

used as a short-term memory for computers to place its data for easy access

Which of the following is true about media production? A. All media elements contain a certain type of editorial viewpoint. B. Producing a media text involves both print and images C. Every type of media has a different set of tools and devices available. D. Media producers are all trying to confuse their audience

Answers

Answer:

C

Explanation:

Every form of media has different resources.

How can a user delete a drawing object?

° Left-clicking on the shape and pressing the Delete key

° Right-clicking on a slide and selecting Delete Shapes

° Dragging a box around the shape, right-clicking on the shape, and selecting Delete

° Double-clicking on a shape, unlocking it for editing, and pressing the Delete key​

Answers

Answer:

Dragging a box around the shape, right-clicking on the shape, and selecting Delete

How can we tell the computer both what to put on
the web page, and how to organize it?

Answers

There is only 1 answer. Code. You have to code the web page if you want to put stuff on it/organize it.

We instruct the computer and tell how to organize the web-page through Coding.

Coding in essence, means the language that instruct computer and these are used to develop application, websites, software and so on.

In order to learn how to code, you must follow certain procedure:

Learning the Basics of HTML and Understanding Document Structure Learn about the CSS Selectors Knowing how to put together a CSS Stylesheet etc.

In conclusion, instruction given to computer to organize a Web-page and communication with the system are made possible through coding.

Learn more here

brainly.com/question/19535447

Your company has three divisions. Each group has a network, and all the networks are joined together. Is this still a LAN?

Answers

No, this is not a LAN anymore (Local Area Network). A local area network, or LAN, is a type of network that links devices in a restricted region, like a campus or a single building.

Which kind of network connects a business?

Several LANs are linked together by a WAN, or wide area network. It is perfect for businesses as they expand because it is not location-restricted in the same way that LANs are. They make it possible to communicate with various audiences and might be crucial for global businesses.

If your client just has a small number of computer units, what kind of network would you suggest?

This paradigm works well in contexts where tight security is not required, such as tiny networks with only a few computers.

To know more about LAN visit:-

https://brainly.com/question/13247301

#SPJ1

Other Questions
A tourist exchanges US$1500 in St Lucia for Eastern Caribbean currency. Given that US$1.00 = EC$2.7169 and that the total bank charges amounted to EC$10.80, calculate the amount in EC currency that the tourist received from the transaction. Why are creative office places more autonomous?A. because creatives prefer autocratic workplacesB. to make it comfortable and collaborative for creativesC. to be managed from the top downD. because they only exist in rural areas Please select the word from the list that best fits the definition Model that describes a typical city as spreading outward from the center, resulting in a series of circles, or zones.Sector ModelConcentric Zone ModelMultiple Nuclei ModelUrban Sprawl an advantage of cdna over genomic dna is that it an advantage of cdna over genomic dna is that it lacks introns. can form very large dna segments. contains selectable markers. lacks exons. is very easy to isolate. Charlemagne is one of the defining figures of the Middle Ages true or false ? What are the most common government restrictions placed on speech?. What happens during a stroke? Las edades de una madre y su hija se diferencian en 26 aos, hace 10 aos la madre tena el triple que su hija. Cules son las edades actuales de las dos? Which of the following product features would best suit a hybridcosting system?A.Identical and very similar featuresB.Identical and unique featuresC.Some unique and individual featuresD.Some According to Truman, which of these was most likely the result of the committee's meeting?(1) the decision to drop the Atom bomb on Hiroshima and Nagasaki(2) the decision to engage in an island hopping campaign in the Pacific(3) dropping the Atom bomb on a deserted island in the Pacific(4) the death of a great number of American soldiers. a higher ratio of labor to other factors than is present in other countries indicates that a country is relatively multiple choice labor-resistant. labor-efficient. labor-intensive. labor-abundant. According to the Janzen-Connell hypothesis, in order for pathogens or herbivores to contribute to the maintenance of diversity: Select all that apply. the pathogens/herbivores must be host-specific. mortality of seedlings due to competition between plants must be less important than mortality due to herbivores/pathogens. the infections must be avirulent. the pathogens/herbivores must result in lower seedling mortality close to adult plants of the same species. mary is making a batch of chocolate chip cookies the recipe calls for 9 cups of flour and 2 4/7 cups of sugar she isshort on flour cuts the recipe down to 7 cups if flour how much sugar should she add Decide whether the sentence is correct or incorrect as written.Tengo unas maestras buenas.correctincorrect You are searching online for the best price you can find for a hat that you really want to buy. The hat originally costs $20 at al three stores. Place the discounts in order of the best buy (at the top) to the worst buy (at the bottom). 1/5 off the price of the hat. 30% off the price of the hat. 5.00 off the hat Let u and y be real numbers. (a) Prove: if r is irrational, then -r is irrational. (b) Prove or find a counterexample: if r and y are irrational, then I +y is irrational The neo personality inventory is an example of a(n) ________ measure of personality. Which single function can be used to determine the length of BC? :v hidffhhhhhhhhhhhhhhhhhhhhhhhhhd Will GIVE BRAINLIST IF YOU ANSWER CORRECTLY Identity the type of reaction and balance the equation, including the states of matter, for the following reactions (5 Points) aqueous aluminum nitrate is added to solid calciumType of Reaction: Double Displacement, Solid Al(NO3)3 (aq) + Ca (s) Al2Ca3 (s) + NO3 (aq) (5 Points) aqueous barium chloride is added to aqueous potassium sulfateType of Reaction:BaCl2(aq) + K2SO4(aq) KCl (aq) + BaSO4 (s) (5 Points) solid magnesium oxide is heatedType of Reaction: MgO (s) (5 Points) solid zinc is added to oxygen gasType of Reaction: Zn (s) + O2(g) (5 Points) aqueous cobalt (II) chloride is added to solid magnesium filingsType of Reaction:CoCl2(aq) + Mg (s) (10 Points) Write a double replacement reaction where one of the products is copper (II) hydroxide. Include the states of matter for each of the reactants and products. (10 Points) Write a decomposition reaction where the reactant is ammonium nitrate.Include the states of matter for each of the reactants and products. (10 Points) Write a synthesis reaction where one of the reactants is aluminum.Include the states of matter for each of the reactants and products.(5 Points) Give three indications that a chemical reaction has occurred.