Listing each prompt that is used in this program.

Assignment Help Computer Engineering
Reference no: EM1335051

Declare Num1, Num2, and Num3 as integers
Declare Average as real
Write "Welcome to the program. Enter 3 positive numbers",
INPUT Num1, Num2, Num3
Average = (Num1 + Num2 +Num3) / 3
Write "The average of three numbers entered is", Average
Stop

1. List all variable name(s) used in this program
2. List each prompt that is used in this program.
3. Show what the PC monitor will show when the program is executed with the following values used: 27, 12, and 15.
4. Write a new program in pseudo-code, it should input-and calculate the average of 5 numbers entered.

Reference no: EM1335051

Questions Cloud

Definitions and parameters for hi-tech crime : Definitions and parameters for hi-tech crime (e.g., hi-tech crime types and the intended results).
Approach for measuring organizational effectiveness : What are the advantages and disadvantages of the resource-based approach versus the goal approach for measuring organizational effectiveness
Description of the tool or technique for decision making : Write apaper on tool and techniques decision making to dicuss description of the tool or technique as well an application example also when one would and when one would not use tools and technique.
Explain promotion exercise - mix and match products : Explain Promotion Exercise - Mix and Match Products and Markets and compare and contrast the two pricing methods explaining why you think they would be similar or different
Listing each prompt that is used in this program. : Write down a new program in pseudo-code, it should input-and calculate the average of 5 numbers entered.
Now assume the government increases spending reducing : Now assume the government increases spending, reducing the country's savings rate based upon this change. What is the effect on the government spending on the economy.
Explain valid predictor of job performance : Provide that seniority is not a particularly valid predictor of job performance, do you think it's unethical for a company to use it as a basis for promotion?
Write down a new program in pseudocode : display what the PC monitor will display when this program is executed with the following values used: 86, 55, and 100.
Hrm around the globe or a multiregional - local approach : Examine and make a recommendation on whether SEIIC should have a uniform approach to HRM around the globe or a multiregional/local approach.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to plan a wan network linking a toy manufacturing plant

How to plan a WAN network linking a toy manufacturing plant? Plan a WAN network linking a toy manufacturing plant (located in Dallas Texas) with two division centres (Los Angeles, California and Pittsburgh, Pennsylvania)

  How important is it to keep the site current

How important is it to keep the site current.According to "Putting Business Online Isn't Always Easy" (2005), "the biggest mistake people make is failing to know the commitment a Web site demands."

  Find out whether an integer is a prime number

An integer greater than 1 is a prime number if its only divisor is 1 or itself. For in case, isPrime (11) returns true, and isPrime (9) returns false.

  Program that uses class to create many fields

write a program that uses class to create many fields.

  System analysis and design

In the System Analysis and Design: Design Patterns – How widely used are design patterns in today’s development environments.

  Technology assumption and analyzing the system

Which businesses and services would no longer be required if the perfect technology assumption were a reality for automobile? Explain how does the perfect technology assumption help with analyzing the system?

  Create a .plan file using pico/nano

Create a .plan file using PICO/NANO

  Prompts the user to enter the number of students

Write down a Java program that prompts the user to enter the number of students and each student's name and score, and finally displays the student with the highest score and the student with second-highest score.

  Studying about the network attack

Describe how a network attacker (an active attacker that can intercept or forge network packets, etc.) could steal secure google.com cookies.

  How to print out the matrices

My main problem is that I don't know how to convert a text file like this into the matrice that I can use. I wasn't taught how to in my previous classes and I think my professor imagine that we know how.

  Encrypt and decrypt the message using the caesar cipher

The cipher that Caesar used is simple technique to replace each letter of alphabet with the another letter further down the alphabet for lowercase and uppercase. Encrypt and decrypt the message using the Caesar cipher with (K=3) in Java.

  Design a "clear" button that clears all of the hours worked

make a "Calculate" button to perform the pay calculations for all of the employees.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd