[10 points] Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of digits.

Answers

Answer 1

Answer:

I am going to write the program using BASIC PROGRAMMING

Explanation:

10 PROGRAM TO CALCULATE SUM OF DIGITS

20 INPUT B,H,T,G

30 LET Y = B+H+T+G

40 PRINT Y

DO THIS ON BASIC PROGRAMMING AND YOU HAVE YOUR PROGRAM


Related Questions

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

After a chart has been inserted and formatted, is it possible to change the data range it refers to or to add new rows of data?

No, additional data cannot be included in a chart once it has been created; the user should delete the chart and create a new chart.
Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.
Yes, click the chart, select the additional rows or columns of data to add, and press Enter on the keyboard.
Yes, double-click the chart and select Properties from the list; in the Properties box, insert the new data range to include in the chart.

Answers

Answer: Yes, click the Select Data button in the Data group under the Design tab to extend or reduce the data range.

Explanation:

Excel allows one to be able to update the data in a graph because the designers knew that information needs to be updated sometimes.

This is why there is an option to use the Data button in the Data group which is under the Design tab to increase or decrease the data range that is to be used in the chart which means that a new row of data could even be added.

Sophie often makes grammatical errors in her document. Which feature of the Spelling and Grammar tool can she use to understand the errors? A. Next Sentence B. Options C. Change D. Explain

Answers

Answer:

D. Explain

Explanation:

Sophie would need an explanation of why she makes grammatical errors to understand the errors.  

what is known as Ip address

Answers

Answer:

IP address stands for internet protocol address; it is an identifying number that is associated with a specific computer or computer network. When connected to the internet, the IP address allows the computers to send and receive information.

A logistics company's vulnerability scan identifies the following vulnerabilities on Internet-facing devices in
the DMZ: SQL injection on an infrequently used web server that provides files to vendors SSL/TLS not used for a website that contains promotional information
The scan also shows the following vulnerabilities on internal resources: Microsoft Office Remote Code Execution on test server for a human resources system
TLS downgrade vulnerability on a server in a development network In order of risk, which of the following should be patched FIRST?
A. Microsoft Office Remote Code Execution
B. SQL injection
C. SSL/TLS not used
D. TLS downgrade

Answers

Answer:

A. Microsoft Office Remote Code Execution

Explanation:

From the given options, we have;

The web server having a SQL injection is infrequently use

The information on the website having SSL/TLS not used is promotional

The location of the server having  a TLS downgrade is on a development network

The location of the Microsoft Office Remote Code Execution is on a human resource system test server

Therefore, given that the test server, is the deployment source of the main server, and that with a Remote Code Execution, RCE,  cyber attack, the attacker is able to make commands work on other computers, the RCE attack on the test server is a potential access of an attack on the main servers, and should be patched first.

explain about third generation of computer​

Answers

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. ... This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used.

Explanation:

hope it helps

write a program to check the password( qbasic)​

Answers

Answer:

Assuming this is in python:

def check_password(password):

   

   correct_password = "qbasic"

   

   if password == correct_password:

       return True

   else:

       return False

def main():

   

   user_input = input("Type in your password: ")

   

   if check_password(user_input):

       print("Correct!")

   else:

       print("Wrong, try again")

     

       

main()

Explanation:

Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.

Have a good day :)

Which of the following stores the operating system?
O Von Neumann center
O Bluetooth center
O the cloud
O random access memory

Answers

Answer:

The Cloud

Explanation:

Clouds are basically computers offsite.  The cloud is used for many things, Like storage, to running applications which needs an operating system to work. Just like the device you are using right now to use Brainly. It needs an operating system to install a web broswer or app to acess a service. Hope this helps!

Helpppppppppppppphuhuh

Answers

Answer:

B

Explanation:

You listed this as Computers and Technology where we post coding questions, or hardware related things, but ok.

If there is 7/8 jugs as the starting amount, and they have a 1/2 jug, dividing 0.875 by 0.5 gives the answer of 1.75 or 1 3/4.

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a member of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do

Answers

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

You have been asked to help a small office with a limited budget set up and configure a Windows network. There are only five computers in this office. In addition to the ability to share network resources, security is a top priority.
Which of the following is the BEST course of action in this situation?
A. Install a HomeGroup to provide a single login and simplify security and sharing.
B. Install a WorkGroup to provide a single login and simplify security and sharing.
C. Install a WorkGroup to allow each device to control what is shared and with whom.
D. Install a HomeGroup to allow each computer to control which items are shared and who can access them.

Answers

Answer:

I will choose a option tin best

Answer: Install a WorkGroup to allow each device to control what is shared and with whom.

Explanation:

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as

Answers

Answer:

Reconnaissance

Explanation:

there are 9 CTSOs, name 3

Answers

Bjhfjjhhuuhhggghhhhhh
Business Professionals of America.
DECA.
Family, Career and Community Leaders of America.

write a c program to display the series: 1,8,27,64,125​

Answers

num_list = [1, 8, 27, 64, 125]

for x in range ( len( num_list) ) :

print (num_list[x])

Write technical term of following statements: a.The set of programs to perform specific task. b.A feature of computer which tells multi-functioning capability of computer. c.The first calculating machine designed for the manipulation of census data. d.The first computer programmer.​

Answers

Answer:

a) Application software

d) Lady Augusta Ada Lovelace

b) (it may be versatility

Your disaster recovery plan calls for backup media to be stored at a different location. The location is a safe deposit box at the local bank. Because of this, the disaster recovery plan specifies that you choose a method that uses the least amount of backup media, but also allows you to quickly back up and restore files. Which backup strategy would BEST meet the disaster recovery plan

Answers

Answer:

Perform a full backup once per week and a differential backup the other days of the week.

Mary uploaded some images on her website. She chose an image and downloaded it. She found that the image she saw on screen did not seem to have the same DPI as when she had scanned it (she had uploaded a scanned image with 300 DPI). What could be reason with this visual decrease in DPI on the computer screen? (Correct Answer only)

A. Some image resolution was lost while uploading it
B. She downloaded a compressed version of the image.
C. The computer reset the resolution of the image.
D. Her file was probably corrupted while downloading.
E. Computer screens typically display images of only 72 DPI.

Answers

It could be A or B, with a guess that it’s A. Many websites require images to be compressed on uploading so that it takes less of the site’s database storage, but the wording leads me to believe it may be B. Any thoughts?

The reason for this visual decrease in DPI on the computer screen is some image resolution was lost while uploading it. The correct option is A.

What is resolution?

Resolution is the quality of the image that we see in the screen. It is the number of pixels per inch of space. The meaning of PPI is pixel per inch. When a high-resolution picture is seen, it means there are more pixels per inch.

When a picture is downloaded from a site. It does not download in the original pixels because during downloading some pixels are lost due to slow net or the settings of the computer. And a compressed version does not download on its own, and corrupted files do not affect the resolution.

Thus, the correct option is A. Some image resolution was lost while uploading it.

To learn more about resolution, refer to the link:

https://brainly.com/question/15189307

#SPJ5

convert (0.255)¹⁰ into binary

Answers

0.01000001010001111011

Must click thanks and mark brainliest

the contribution of Charles Babbage in the history of computer​

Answers

Charles Babbage also known as the “father of computers” have made an incredible contribution in the evolution and history of computers. His most well-known invention, the analytical engine was a proposed mechanical general-purpose computer with complex machinal working features. Today, most computers follow Charles Babbage’s analytical engine’s process of working (IPO). Charles Babbage was the one to originate the concept of a digital programmable computer. Other mentionable invention of Charles Babbage is difference engine.


Plz give me the brainliest :)

What method is used to prevent the random number generator from always starting with the same number?

seed()

random()

randint()

initialize()

Answers

Answer:

seed()

Explanation:

Since computer random isn't actually random, and is a predetermined sequence of numbers, seed() allows us to create different sequences of numbers, and thus more randomized numbers.

Hope this helps!

Answer:

the answer is seed()

Explanation:

i took the assignment

describe in detail what each step would look like if you ran into a software error.

Answers

Answer:

First you have to identify the problem.

Second Gather information.

Third iterate through potential solutions.

Fourth Test your solution.

Explanation:

There are many different ways to handle errors in software but this is the way I do it.

Hope this helps :)

After running into a software error, a user needs to first determine the reason for the error, work towards a solution and then execute the solution discovered.

Software Error

A software error occurs when an error or unusual behaviour is observed in a piece of software and which can be reproduced after certain actions are performed that are in line with the stated rules of the software developer. In other words, a software error does not occur if the software was not used as directed by the software developer.

You can learn more about software errors here https://brainly.com/question/18497347

#SPJ6

solve plz
Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use?

JavaScript
HTML
CSS
Text editor

Answers

Answer:

HTML

Explanation:

HTML is used is making web pages.

Answer:

what

Explanation:

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture curate and consumer customer information?

Answers

Answer:

Data and Insights

Explanation:

In an enterprise platform, the data and insights are considered as one of the important aspect of any enterprise. It helps in better understanding of the customer so that the enterprise successfully offers best services to the customers.

Data are basically the information that enterprise can gather from the customers and insights are defined by gaining knowledge by analyzing these data so that the company can provide best customer service and it also helps them to capture curate as well as consumer information.

Thus the answer is 'data and insights'.

full form of ip ........?​

Answers

internet protocol - hope this helps!

Which of these is NOT a user interface?

A. Graphical user
B. Command line
C. Icon interface
D. Menu driven​

Answers

Answer:

menu driven is not an interface

Explanation:

hope that helps you

please follow

please mark brainliest

I will follow you if you mark me brainliest

Which of these is NOT a user interface?

Choose: B. Command line

With respect to using software to build a project network, the authors contention is that... Multiple choice question. Understanding the calculations used is vital to proper use. Software makes up for the need to understand the forward/backward pass calculations and is not necessary for a person to know the pass calculations.

Answers

Answer:

They should have a common start and end node, numbering activity aides clarity, and no "if-then" statements

When constructing a project network for a project with 25-100 tasks, a common industry practice is to

utilize the "yellow sticky" approach

What is the process of planning, designing, and implementing change requests?


_____ is the process of planning, designing, and implementing change requests.

Answers

Answer:

Change Management

Explanation:

The described process is formally known as Change Management

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

What is the primary difference, if any, between a web master and a web producer? While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system. While a web producer maintains a company’s websites, the web master maintains a company’s entire web-based system. While a web master maintains a company’s web presence, the web producer maintains all technology at a company. While a web producer maintains a company’s web presence, the web master maintains all technology at a company.

Answers

Answer:

While a web master maintains a company’s websites, the web producer maintains a company’s entire web-based system.

I'm assuming that's A

Other Questions
How many skirt-blouse outfits can a woman choose from if she has 5 skirts and 6 blouses? By the early 1980s, the population of Florida panthers had dwindled to fewer than 30. Furthermore, within this population was a high frequency of detrimental traits, including low sperm count and undescended testicles in males, and kinked tails in both sexes. The future for this iconic population was bleak at best. Provide an explanation for the observed detrimental traits. Provide a possible solution that would both increase the likelihood that the population would survive and preserve the genetic identity of this unique population. Will give Brainliest!Find the period and amplitude of the function.y = -4cos(4/3 x)Give the exact values, not decimal approximations. What is the value of m in the diagram? Which best describes why Women's Christian Temperance Union was formed? Members were concerned about the impact of new ideas on their communities. Members were concerned about the impact of alcohol on their communities. Members wanted to organize distillery workers, who had few rights. Members wanted more religious freedom for their families. A large atomic bomb produces around 8.00x1015J of energy. How much matter does that bomb turn into energy?A)2.67x10^79kgB)2.67x10^7kgC)7.20x10^32kgD)0.0889kg Why is population education a multidimensional educational process? Select all of the meals that contain carbohydrate. A. Bowl of chili with kidney beans B. Meat and cheese platter C. Bowl of ice cream with fresh blueberries on top D. Bowl of whole wheat pasta with red sauce E. Plate of bacon and eggs Which expression is equivalent to 4 + 36x? Does anyone know the answer?? Please help asap, I would like to double check my answer with someone. Thank youDuring the Era of Warring States in China,Confucius was advocating forA. peaceful protestB. obedienceC. civil disobedienceD. free speech Help me please i have no idea how to do this 2.Nm 1908, di nh hng trc tip ca phong tro Duy Tn, Trung K 10 imA. thu ht nhiu thanh nin tham gia phong tro ng DuB. bng n khi ngha do Phan Chu Trinh lnh oC. din ra phong tro chng i phu, chng su thuD. ra i nhiu t chc b mt do Phan Xch Long ng u ? Describe two distinct reasons why someone who has never used a drug in his or her life might refuse a test at work. Convert those reasons into well-founded ethical arguments. Difference between gravitational force and frictional ba x th c lp bn vo mt mc tiu. xc sut bn trng tng ng l 0,8; 0,7; 0,6. mi x th bn mt vin. gi X l s vin bn trng.a) lp bng phn phi xc sut.b) tnh E(X) v VAR(X) Change the given sentences using must, can't, or may/might a) I'm sure he is sleeping. b) Certainly he was at home. c) Perhaps she hasn't got the invitation d) I'm sure they didn't take the bus. e) Probably she is absent. Which is the angle of depression from b to c1.) Using a little - Little - A few - few - a great deal of - hardly and of and Example sentence.