The three statements that take the problem-solving process to another level are
AND, OR, and THEN
IF, THEN, and ELSE
THIS, THAT, and OTHER
TRUE, FALSE, and POSSIBLE

Answers

Answer 1

The three statements that take the problem-solving process to another level are:

IF, THEN,  ELSE

In computer programming, they are known as conditional statements that give alternate commands to the computer system if a condition is not satisfied.

For example, a sample algorithm is given below:

Ask for student scores

If score > 70

THEN

Print "You have an A"

ELSE

IF score greater than or equals to 60 and < 70

THEN

Print "You have a B"

What is a Conditional Statement?

This refers to the types of statements that give alternate commands to the computer system if a condition is not satisfied.

Hence, we can see The three statements that take the problem-solving process to another level are:

IF, THEN,  ELSE

In computer programming, they are known as conditional statements that give alternate commands to the computer system if a condition is not satisfied.

For example, a sample algorithm is given below:

Ask for student scores

If score > 70

THEN

Print "You have an A"

ELSE

IF score greater than or equals to 60 and < 70

THEN

Print "You have a B"

Read more about conditional statements here:

https://brainly.com/question/18736215

#SPJ1


Related Questions

Write the contribution of baise pascal and dr herman hollerith in the histroy of computer

Answers

Answer:Computers truly became a revolutionized invention during the last part of the 20th century. They have already helped win wars, solve seemingly insoluble problems, saved lives and launched us into space. Their history spans more than 2500 years to the creation of the abacus. This resource provides a brief history of computers.The Pascaline

In 1642, an eighteen year old French scientist, writer and philosopher, Blaise Pascal (1623–1662), invented the very first mechanical calculator. It was named the Pascaline.

It had been created as an aid for Pascal’s father, who was a tax collector. Pascal built fifty of these gear driven calculating machines and couldn’t manage to sell many due to their expensive cost.

Explanation:

What is the advantages of using Emails compared to postal Emails.​

Answers

There is a chance you will not receive the postal email because it could get lost while coming but an email that is electronic couldn’t get lost unless you give them the incorrect email, but then again that could happen with postal emails. Though there are cons of using electronic email the pros will always out weigh the cons.

Bruno works in a food processing plant. One of his jobs is to monitor the refrigeration equipment so that all the foods are being stored at a safe temperature. He inspects the thermometers on the 10 refrigerators that hold packaged meat ready for shipment. Which refrigerator needs Bruno’s attention?

A.
the one reading 38°F.

B.
the one reading 37.7°F.

C.
the one reading 40°F.

D.
the one reading 42.8°F.

Answers

The refrigerator that needs Bruno’s attention is option D. the one reading 42.8°F.

Check more about Temperature  below

What Is the Best Temperature for My Refrigerator?

There are different kinds of temperature for any  refrigerator. The Food and Drug Administration states that 40 degrees Fahrenheit or lower is the recommended refrigerator temperature (FDA).

Note that Salmonella, E. coli, and listeria, three bacteria are those that can result in foodborne diseases, and thus cannot grow at these temperatures.

Therefore, based on the above, The refrigerator that needs Bruno’s attention is option D. the one reading 42.8°F.

Learn more about refrigerator from

https://brainly.com/question/13143746
#SPJ1

What types of traffic can still fool stateful firewalls?

Answers

The types of traffic can still fool stateful firewalls incude the following:

Packets containing hazardous contents.Normal protocols that are running on non-standard ports.

What is a firewall?

A firewall can be defined as a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

In Computer technology, a firewall is typically used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Additionally, the other functionality which would influence a decision to deploy a stateless, rather than stateful firewall are:

Block TCP portsAllow network protocols.

In this context, we can reasonably infer and logically deduce that the types of traffic can still fool stateful firewalls incude the following:

Packets containing hazardous contents.Normal protocols that are running on non-standard ports.

Read more on stateful firewall here: brainly.com/question/16157439

#SPJ1

How does technology effect ecological, social, practical, moral, ethical, political, andaesthetic values in the society?

Answers

The technology effect ecological, social, practical, moral, ethical, political, and aesthetic values in the society is it is one that has influenced the way individuals often communicate, as well as learn, and think.

How does technology affect moral values?

The use of technology  is one that helps a a lot of people to a lot of healthier, more educated, as well as  making a lot of work decision.

The technology effect  is one that affect the ways that humans do communicate, learn, and as well as think. It helps to shape the human society and also to know how people talk with each other on a consistent basis.

Since Technology plays a key role in society today. It is one that has both positive and negative effects on the world as well as human lives.

Hence, The technology effect ecological, social, practical, moral, ethical, political, and aesthetic values in the society is it is one that has influenced the way individuals often communicate, as well as learn, and think.

Learn more about technology from

https://brainly.com/question/25110079
#SPJ1

Which is best app to create websites​

Answers

Answer:

Wix.

Explanation:

Wix is a cloud-based website builder that includes web hosting and design services.

Its user-friendly drag-and-drop tools and over 500+ ready-made templates help you build your website without either having specialist skills or hiring a web developer. Wix accelerates the web development process and gives you the creative freedom to build the website you desire.

Wix is an ideal website builder for small and medium eCommerce businesses. It has over 200 million registered users across the world and is available in 17 languages (Wix).

According to Enlyft, Wix’s largest customer base is in the US (57%), followed by the UK (6%) and Canada (6%). Is Wix the Best eCommerce Platform? Wix eCommerce is an eCommerce website builder that lets you create a custom online store, sell products, and scale your business to the next level.

It’s also an excellent eCommerce platform for small and medium businesses that’s easy to use, customize, and relatively affordable. However, whether it’s the best eCommerce platform for you will depend largely on your specific business needs.

explain the features of the first operational stored - program computer
?​

Answers

Answer:

The first stored-program computers. It featured the first rotating drum storage device. Manchester Baby, a developmental, fully electronic computer that successfully ran a stored program on June . It was subsequently developed into the Manchester Mark , which ran its first program in early April .

8. What should one do in order to gain the most benefit from the concept of learning styles?
a. Be rigid
b. Be persistent
c. Be imaginative
d. Stay flexible

D stay flexible

Answers

The thing that a person should do in order to gain the most benefit from the concept of learning styles is option D: stay flexible.

What does learning styles mean?

Learning styles can be categorized, identified, and described in a variety of ways. They are, in general, broad patterns that give teaching and learning direction.

Another way to think of learning style is as a set or a given group of elements, actions, as well as attitudes that support a person's learning in a specific circumstance.

Therefore, based on the above, The thing that a person should do in order to gain the most benefit from the concept of learning styles is option D: stay flexible.

Learn more about learning styles from

https://brainly.com/question/3274282
#SPJ1

Write a C++ program which reads a given integer n and prints its twin
prime.
"A twin prime is a prime number that is either 2 less or 2 more than another prime
number" for example, either member of the twin prime pair (41, 43). In other
words, a twin prime is a prime that has a prime gap of two".
Sample Output:
Enter an integer:
11
Twin prime number of 11 is:
13

Answers

The C++ program that reads a given integer n and prints its twin prime is given below:

The Program

#include <iostream>

#include <cmath>

using namespace std;

int main() {

   const int num_primes = 10005;

   bool primes[num_primes];

   for (int i = 2; i != num_primes; ++i) {

       primes[i] = true;

   }

   for (int i = 2; i != int(sqrt(num_primes)); ++i) {

       if (primes[i]) {        

           for (int j = 2; i * j < num_primes; ++j) {

               primes[i*j] = false;

           }

       }

   }

   int n;

cout << "Input an integer:\n";

   cin >> n;

cout << "Twin primes are:\n";

       for (int i = n; i - 2 >= 0; --i) {

           if (primes[i] && primes[i-2]) {

               cout << i-2 << " " << i << endl;

               break;

           }

   }

   return 0;

}

The Output

Input an integer:

Twin primes are:

11 13

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

what is network security and why we need it?​

Answers

Answer:

Network Security protects your network and data from breaches, intrusions and other threats. This is a vast and overarching term that describes hardware and software solutions as well as processes or rules and configurations relating to network use, accessibility, and overall threat protection.

Explanation:

brainliest please

4.15 LAB: Convert to reverse binary
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in reverse binary. For an integer x, the algorithm is:

As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x / 2

Please help me!!

Answers

A program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in reverse binary is

num = int(input())

while num > 0:

   y =(num % 2)

   print(y, end='')

   num = (num//2)

print()

num = int(input("Enter a number"))

string = ""

while num > 0:

   y =str(num % 2)

   string+=y

   num = (num//2)

reverse=string[::-1]

print(reverse)

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

When a computer is being developed, it is usually first simulated by a program that runs one instruction at a time. Even multiprocessors are simulated strictly sequentially like this. Is it possible for a race condition to occur when there are no simultaneous events like this?

Answers

My response is Yes, the simulated computer is one that can be multiprogram med.

What is meant by computer simulations?

A computer simulation is known to be a kind of a program that is known to often run on a computer and it is said to be one that uses a form of  step-by-step mechanism to examine or look through the  behavior of a mathematical model.

Note that this is said to be a model of a real-world system and as such, My response is Yes, the simulated computer is one that can be multiprogram med.

Learn more about simulated computer from

https://brainly.com/question/24912812

#SPJ1

What question should you ask when deciding which device to design for first? (UX)


Where will users go once they access the app or website?

Where will users be when they access the product?

When will users access the product?

How much do users pay for internet access, cellular access, or wi-fi signal?

Answers

Answer:

I think it's either "Where will users go once they access the app or website?" or "How much do users pay for internet access, cellular access, or wi-fi signal?"

This one's tricky

how to print name 100 times in python

Answers

Answer:

How do you print a name 100 times in python? Use range () to print a string multiple times. Use range (stop) to create a range of 0 to stop where stop is the number of lines desired. Use a for-loop to iterate through this range. In each iteration, concatenate the string to itself by the number of times desired and print the result.

Explanation:

Which type of memory management system is feasible for mobile computing?

Answers

The  type of memory management system is feasible for mobile computing is known to be built in memory (RAM).


What is memory management in mobile computing?

The term Memory Management is known to be the act of controlling as well as coordinating computer memory.

It  is one that tends to share some parts known as blocks to a lot of running programs to be able to optimize the total  performance of the system.

Therefore, based on the above, The  type of memory management system is feasible for mobile computing is known to be built in memory (RAM).

Learn more about memory management from

https://brainly.com/question/27993984

#SPJ1

what is a computer and explain it's features


Answers

Answer: A computer is a technological device usually used for storing or transferring data, usually in binary form. The features of a computer now are outstanding from say an old Macintosh, or anything before Windows 7 really, some of its features are for programming like PLC Robots, and what most people would use it for is internet access, a way to communicate with friends or my personal favorite gaming an entire world of games on applications like Steam or Epic Games, and even if you're not a gamer you can still appreciate the fast speeds and FPS I run at a standard 120FPS because it keeps most games running smooth and still has high-quality graphics.

Why might a programmer use a "linked list" instead of an "array" to store data in a computer program?

Answers

The programmer uses a “linked list” instead of an “array” to store data due to its dynamic nature and quicker insertion/deletion time complexity, linked lists.

What is a linked list?

A linked list is a linear line or collection of data whose data is not organized in a way in a physical memory. A data structure consists of collecting nodes.

The array is also a collection of data of elements. They are identified by an array index and array key.

Thus, the programmer used a “linked list” instead of an “array” because It is the quick and easy way.

To learn more about the linked list, refer to the link:

https://brainly.com/question/13144722

#SPJ1

Heat travels from a substance to a substance

Answers

Answer:

Heat is transferred from one object to another by the collision of the particles in the two substances.

Explanation:

Heat is transferred from one object to another by the collision of the particles in the two substances.

"As a busy professional and avid book lover, I want to be able to reserve books in advance, so that I can pick them up based on my schedule.” (ux)

What component of the user story addresses the persona’s goal to access books they want to read when they arrive at the library?


Demographic

Benefit

Action

Role

Answers

Answer:

The answer is benefit

that it

Write an expression that computes the sum of two double variables total1 and total2, which have been already declared and assigned values.

Answers

The expression that computes the sum of two double variables total1 and total2, which have been already declared and assigned values is total1+total2.

What is double variable?

The double data type is built into the compiler and is used to define numeric variables that hold numbers with decimal points.

Many programming languages, including C, C++, C#, and others, recognize the double as a type.

A variable can be declared as double by prefixing it with the double keyword. You mostly used this data type, which has 14 or 15 decimal digits.

However, it must be used with caution because it requires 8 bytes of memory storage and is an expensive method.

total1+total2 is the expression that computes the sum of two double variables total1 and total2, which have already been declared and assigned values.

Thus, this can be the expression that computes the sum of two double variables total1 and total2.

For more details regarding double variable, visit:

https://brainly.com/question/1979738

#SPJ1

Find the following measures of central tendency for the given set of data. {1, 3, 9, 11, 2}

Answers

Answer:

(1+3+9+11+2)/5=26/5=5.2

Let T = {3, 5, 7, 9, 11, 22, 44}. Which of the following statements
are true?

Answers

Answer:

None of them, cause theres no statements and please let us know the language

HELP PLEASE

Which member of the game design team writes the step-by-step computer
instructions, or code, required to create games?


Game designer

Programmer

IT specialist

Sound engineer

Answers

It should be the game designer cause they designed the game

Answer:

Programmer

Explanation:

Given a variable fraction that contains a double value, write a statement that writes the value of fraction to standard output.

Answers

Given a variable fraction that contains a double value, a statement that writes the value of the fraction to standard output is print(float(fraction))

What is a Println?

This is an output command that is used to print a line in a programming sequence that contains a variable.

Hence, we can see that Given a variable fraction that contains a double value, a statement that writes the value of the fraction to standard output is print(float(fraction))

This is because it is meant to contain decimal numbers when doing calculations so print(float(fraction)) is used.

Read more about println here:

https://brainly.com/question/14467221

#SPJ1

Amed is utilizing a feature that will use two tables. The first table contains a primary key matched to a foreign key in the second table. The query results will include all entries from the first table. Which feature is he using?

left outer join
right outer join
self join
inner join

Answers

Answer:

left outer join

Explanation:

Benefits of Time Management include all EXCEPT the following

A. You are more efficient

B. You feel more stressed

C. You have more energy

D. You develop more qualities

Answers

Answer:
B.

Explanation: With good time management you feel less stress or little to no stress.

Answer:

The only disadvantage of time management is b), you feel more stressed.

Explanation:

Because you have made a plan and have to respect it, it puts pressure on you so you can feel stressed.

I hope this helps!

# Activity 1
# This activity has the objective of practicing
# how to write if statements.
# For this example there are four kinds of flowers:
# 1. Blue and small ( less than 2 inches in size)
# 2. Blue and large ( >= inches in size)
# 3. Red and small
# 4. Red and large
# The user is prompted to enter the color and
# the size of the flower and you will
# print the corresponding kind of flower

Answers

The If-statement that is made up for the given activity is given below:

How to write an IF Statement

# 1. Blue and small ( less than 2 inches in size)

If Blue is less than 2 inches in size

Print "This is blue and small"

# 2. Blue and large ( >= inches in size)

If Blue is greater than 6 inches in size

Print "This is blue and large"

# 3. Red and small

Loop

# 4. Red and large

End

Read more about if statements here:

https://brainly.com/question/11073037

#SPJ1

As the network administrator for a growing ISP, you want to make efficient use of your network addresses. One of the network addresses IANA assigned to you is a Class C network of 197.14.88.0. You have decided to use the addresses in this Class C network to satisfy the IP address requirements of 16 corporate customers who need between 10 and 14 addresses each. Calculate a subnet mask that meets their needs. List the subnet mask and the first four subnet addresses the mask will create.

Answers

The List of the subnet mask and the first four subnet addresses the mask will create  are:

IP 197.14.88.0Subnet 255.255.255.240First 4 host addresses 197.14.88.1, 197.14.88.2, 197.14.88.3, 197.14.88.4/20 (255.255.255.240) is 16 addresses with 14 usable IP addresses All of the corporate customer can have 20 starting with 197.14.88 and each of the IP addresses in that scope will be utilized.

What are subnet addresses?

It is known to be a kind of an autonomous system that is said to be made up of several networks can use subnet addressing to share an Internet address.

Therefore, The List of the subnet mask and the first four subnet addresses the mask will create  are:

IP 197.14.88.0Subnet 255.255.255.240First 4 host addresses 197.14.88.1, 197.14.88.2, 197.14.88.3, 197.14.88.4/20 (255.255.255.240) is 16 addresses with 14 usable IP addresses All of the corporate customer can have 20 starting with 197.14.88 and each of the IP addresses in that scope will be utilized.

Learn more about subnet addresses from

https://brainly.com/question/8907973
#SPJ1

A design team is working on a design project for an event ticketing app to reduce paper tickets. They suggest the following design problem statement: Ricki is an avid sports fan and wants to avoid printing tickets that will be discarded once they’re in the stadium. What element is missing in the problem statement? (UX)

User name

User need

Insight

User characteristics

Answers

The element that is missing here are users characteristics. The correct option is D.

What is problem statement?

A problem statement is a succinct description of an issue that needs to be addressed or a condition that needs to be improved.

It determines the difference between the current and desired states of a process or product. The problem statement should address the Five Ws while focusing on the facts.

The problem itself, plainly stated and with enough please start to establish why it is crucial; the method of solving the problem, often asserted as a claim or a working thesis; and the purpose, statement of objective, and scope of the document the author is preparing.

As in the given scenario, Ricki is an avid sports fan and wants to avoid printing tickets that will be discarded once they’re in the stadium it requires user characteristics.

Thus, the correct option is D.

For more details regarding problem statement, visit:

https://brainly.com/question/11657822

#SPJ1

Provide a code example for a shape with no outline. What can you do to ensure this is the
outline that will be used?

Answers

A code example for a shape with no outline or one that its borders has been removed has been given below:

The Code

Dim rngShape As InlineShape

For Each rngShape In ActiveDocument.InlineShapes

   With rngShape.Range.Borders

       .OutsideLineStyle = wdLineStyleSingle

       .OutsideColorIndex = wdPink

      .OutsideLineWidth = wdLineWidth300pt

   End With

Next rngShape

Read more about shapes and borders here:

https://brainly.com/question/14400252

#SPJ1

Other Questions
Determine whether each series is arithmetic or geometric. Then evaluate the finite series for the specified term number. 5000+1000+200+. . . . . . ; n=5 What is 50+50 and explain how you got the anwer How do agency problems arise? Give some examples of agency problems in the South African context. How can corporations monitor the costs of the problem? Quality awards have been established to do what? a) reward quality b) managers to make companies c) famous generate d) improvement in quality Daphne contracts with speedy builders inc. To construct a six-foot fence around her yard. Daphnes neighbor rando is delighted because daphnes fence will border the north side of his property. This means he can enclose the rest of his property for a much lower price. Before construction begins, however, speedy builders receives an offer for another, more lucrative project, and refuses to perform the contract with daphne. Who can sue speedy builders for breach of contract?. Please Hurry!! i need help with these questions.Letter from Andrew Jackson to the Seminole IndiansFebruary 16, 1835My Children:I am sorry to have heard that you have been listening to bad counsel. You know me, and you know that I would not deceive, nor advise you to do anything that was unjust or injurious. Open your ears and attend to what I shall now say to you. They are the words of a friend, and the words of truth.The white people are settling around you. The game has disappeared from your country. Your people are poor and hungry. All this you have perceived for some time.My Children, I have never deceived, nor will I ever deceive any of the red people. I tell you that you must go, and that you will go. Even if you had a right to stay, how could you live where you are now? You have sold all your country. You have not a piece as large as a blanket to sit down upon. What is to support yourselves, your women, and children? The tract you have ceded will soon be surveyed and sold, and immediately afterwards will be occupied by a white population. You will soon be in a state of starvation. You will commit depredations upon the property of our citizens. You will be resisted, punished, perhaps killed. Now is it not better peaceably to remove to a fine, fertile country, occupied by your own kindred, and where game is yet abundant? The annuities payable to you, and the other stipulations made in your favor, will make your situation comfortable, and will enable you to increase and improve. If, therefore, you had a right to stay where you now are, still every true friend would advise you to remove. But you have no right to stay, and you must go You shall be comfortably taken care of, and kindly treated on the road, and when you arrive in your new country, provisions will be issued to you for a year, so that you can have ample time to provide for your future support.But lest some of your rash young men should forcibly oppose your arrangements for removal, I have ordered a large military force to be sent among you If you listen to the voice of friendship and truth, you will go quietly and voluntarily. But should you listen to the bad birds that are always flying about you, and refuse to move, I have then directed the commanding officer to remove you by force. This will be done. I pray the Great Spirit, therefore, to incline you to do what is right.Your FriendA. Jackson- In what ways was Jackson telling the truth?- In what ways was he not telling the Seminole the truth? Explain why the statements are untrue. By first rounding each number to 1 significant figure, estimate the answer to 527 +389 What adaptation did the people of ancient Egypt have to make to ensure they would have a supply of silt? O People had to gather it quickly and store it in temples. O People had to create mastabas to ensure it would not enter the city. O People had to manage floodwaters to ensure its supply through canals and dams. O People had to water it to maintain its supply all year. What can we use to represent repeated multiplication Which of the following is an example of an inclusive term? describe three reasons responsible for the differences in the climate 10. Balance the redox equationsa) SnO + H Sn + HO Find the sum of 2.53 x 1019 and 3.197 x 1017. 2.56197 x 1019 3.2223 x 1019 2.56197 x 1036 3.2223 x 1036 A meeting of the minds refers to If a student picked is 10 years old, whatare the chances that they skip breakfast? Like the tehuelche in "tehuelche," the inughuit in "linguist on mission to save inuit fossil language disappearing with the ice" are native people . what is the moral of the story of Suleyman and the ants? Expand and simplify (2x+5) (2x-5) (3x+7) You're going on a 1211-mile trip, and your car gets about 29 miles per gallon. Gas prices along your route average $3.10. Estimate the cost of gasoline for this trip by rounding the distance to 1200 miles, the mileage to 30 miles per gallon, and the cost of gas to $3.00 per gallon. Calculate the answer without using estimation and compare the two results. (Round your answers to the nearest cent.) Write an equation of the line through the pair of points in slope-intercept form. (Lesson 3-4 ) (-1,8) and (5,-4)