CLS
INPUT "Enter your marks in computer": CS
C>40 THEN
PRINT "You are passed.
ELSE
PRINT "You are failed."
IF
END

DEBUG THE PROGRAM​

Answers

Answer 1

Answer:

INPUT "Enter your marks in computer";CS

IF C>40 THEN

PRINT "You are passed. "

ELSE

PRINT "You are failed."

END IF

Explanation:

see corrections above.


Related Questions

5. Write the name of the tab, the command group, and the icon that you need to use to add an image
to a Word document.

Answers

Answer:

"insert" Tab, "illustrations" command group, "Pictures" icon

Explanation:

Answer:

Tab: Insert

Command group: Illustrations

Icon: Pictures

Explanation:

Your client wants to offer a 10% discount to their wholesale customers. Which 2 features of QuickBooks Online will they need to use to set this up?

Answers

Answer:

The two features of QuickBook are "Customer types  and Price rules".

Explanation:

Following are the description of the above QuickBooks online features, which will give the 10% additional discount:  

Select Sales and Consumers from the menu icon in QuickBooks Or customer types were chosen.  Choose the gear icon for both the price rules and select all items from the items. Choose to price and choose the latest pricing rule.

What would be the best thing you could do to prepare yourself to work for a company that has embraced globalization. A) learn how to operate a copier B) learnable foreign language C) dress appropriate for work every day D) study different organizational structure Thx for you help

Answers

Answer:

B

Explanation:

The best thing you could do to prepare yourself to work for a company that has embraced globalization is study different organizational structures. Thus, option D is correct.

What is the best way to promote globalization?

The best thing you could do to prepare yourself to work for a company that has embraced globalization is to study different organizational structures. This would help you to gather knowledge about different organizational working structures and figure out planing strategies to deal with each organization accordingly.

Technological globalization refers to the increasing pace at which new technologies are disseminated throughout the global economy. It refers to the global transfer of technology from developed to developing countries.

Therefore, The best thing you could do to prepare yourself to work for a company that has embraced globalization is study different organizational structures. Thus, option D is correct.

Learn more about globalization on:

https://brainly.com/question/30331929

#SPJ5

What would a client select in their Manage Users screen to give their worker access to create invoices, but not write checks in their QuickBooks Online company?

Answers

Answer:

select Custom radio button and check Invoicing box

Explanation:

Quick Books allows clients to give limited permissions to their worker. These limits include the access to the invoices and access to some part of the Customer section which includes sales receipts, refunds. You can follow the steps given below to add a worker and give limited access:

Click Gear Icon

Select Manage Users.

Click New button.

Choose user type page will appear

Choose Regular or custom user.

Choose Limited

Tick on the Customers and Sales check box.

Set the users admin rights and click on Next button.

Enter the First Name, Last Name and Email Address of worker.

Click on Next

Click on Finish.

The symbols on the numeric row are secondary characters accessed with the shift key.
True or False?

Answers

Answer:

I've never used the shift key, I'd say false.

True, because they are the extra keys that can't go anywhere else.

E sentences about logic problems using the drop-down menu. Logic problems can be solved with . Logic problems can be solved in a . The to solve a logic problem form an algorithm. Algorithms enable a to solve logic problems.

Answers

Answer:

Logic problems can be solved with WELL-DEFINED STEPS. Logic problems can be solved in a METHODICAL MANNER. The WELL-DEFINED STEPS  to solve a logic problem form an algorithm.  Algorithms enable a  COMPUTER to solve logic problems. Please, if you could, mark brainiest and thank. Thank you!

The complete sentences of logic problems are as follows:

Logic problems can be solved with well-organized steps.Logic problems can be solved in a methodical manner.The well-organized steps are used to solve a logic problem from an algorithm.Algorithms enable a computer to solve logic problems.

What do you mean by Logical problem?

A logical problem may be defined as a type of problem that requires the mechanism of self-explanation on the basis of internal thoughts, processes, and understanding of the complete consequences behind the problem.

These problems are also solved by computers with the help of algorithms. They require some well-organized steps which make the foundation for determining the most accurate and valid solution to logical problems.

Therefore, the complete sentences of logic problems are well described above.

To learn more about Logical problems, refer to the link:

https://brainly.com/question/28285646

#SPJ5

A machine is having issues, so the user is responsible for getting the machine serviced. Which stage of the hardware lifecycle does this scenario belong to

Answers

Answer:

Maintenance, is the right answer.

Explanation:

A stage where the hardware of a machine is replaced due to some issues which make the machine work inappropriately is called the maintenance stage of the hardware. In this phase, some modifications are made in the hardware to support the operational effectiveness of the hardware. The customer executives try to improve the performance of the system and provide better security during replacing the hardware.

The shift keys are smaller than the rest of the keys

True or False?

Answers

False, because it's smaller than the space key, and bigger than the letter, number, backspace, tab, enter, and arrow keys.

pseudocode is a good choice to communicate a _____ of a process
is it?!
1.step
2.summary
3.close up

Answers

Answer:

close up

Explanation:

you could also say deatiled view, i believe. hope this helps

Answer:

detailed view

Explanation:

A detailed view provides the complete picture of a problem and it explains how the problem is solved using algorithm.

how do I make a division sign with my Chromebook keyboard?

Answers

Answer: you can't

Explanation: The best way to make one is to search for one then copy and paste

Hope this helps^^

To create a division sign "÷" on a Chromebook, hold "Ctrl" + "Move" + "+". This gets to extraordinary characters on Chromebooks.

How do I make a division sign with my Chromebook keyboard?

On a Chromebook keyboard, you'll make a division sign "÷" by utilizing the following steps:

Press and hold the "Ctrl" (Control) key.Whereas holding the "Ctrl" key, press the "Move" key.Without discharging the "Ctrl" and "Move" keys, press the "+" (also) key.

This combination of keys will deliver the division sign "÷" on your Chromebook. The "Ctrl + Shift + +" alternate route could be a common way to access special characters, counting scientific images, on Chromebooks.

Keep in mind to guarantee merely are utilizing the console with a US format, as the area of keys might shift slightly totally different formats.

Learn more about the division sign here:

https://brainly.com/question/25289437

#SPJ6

To save a document as a new file name select A. File New B. Save C. Save as D. File open

Answers

Answer:

C

Explanation:

To save a document as a new file name select we need to Save as

Suppose your name was Alan Turing. Write a statement that would print your last name, followed by a comma, followed by a space and your first name.

Answers

Answer:

def name_string( name ):

     user_name = name

     split_name = user_name.split(" ")

     list( split_name )

    print ( split_name[ 1 ], ", ", split_name[ 0 ] )

# the test should print out " Turing, Alan"

name_string ( " Alan Turing " )  

Explanation:

The python function above should print out the reverse of a name and surname and separated by a comma.

What Word Goes In The Blank?

One of the most fundamentally important virtues of a(n)_______
is that if we can specify one to solve a problem, then we can automate the solution

Answers

Answer:

algorithm

Explanation:

Which is a solution that represents the majority of VPNs on the market and is commonly referred to as a VPN appliance?

Answers

Answer:

Remote access VPN

Explanation:

The solution that represents the majority of VPN's on the markets and is commonly referred to as a VPN appliance is the Remote access VPN

A remote access VPN is a type of VPN  that  works by creating a virtual channel (appliance ) between different devices for the purpose of exchanging data in an encrypted form. although this Tunnel passes through the public internet the Data exchanged are only accessible by the devices connected via the tunnel only .

The remote access VPN  is mostly used to connect an employee to the company's network therefore it represent the majority of VPNs in the market.

list 7 ways of generating
airlines​

Answers

Answer:

1. improve air quality..

2. Eats food rich in antioxidants...

3. Stop smoking....

Answer:

money

Explanation:

3. Ethnocentrism can be overcome by

Answers

It can be overcome by Diversity

Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked?

Answers

Answer:

The answer is:

(1)Select the bullet, that is used in the list

(2)Defining the new bullet, which is used in the list

Explanation:

In the question, the choices were missing. so, we define the correct choice only.

In choices 1 and choice 2, both use the bullets, but in choice 1, it is used in the list, in which it is used to define the list options, and in the choice 2, it defined the new bullets in the list.  

Why is Copyright important?

Answers

Copyright protects those words from being used in any form without the author's approval. They're your words, your product.

Select the correct answer from each drop-down menu.
Suzanne wants to use a digital media tool that acts like a journal and facilitates discussion, which digital media tool should Suzanne use for this
purpose?
Suzanne should use a(n)
She needs to download
software, such as Wordpress, for this purpose.

Answers

Answer:

Suzanne needs a blog

Explanation:

Because she wants to use a digital media tool that acts as a journal and facilitates discussion, Suzanne would need a blog for this.

A blog is a platform where people can meet and have discussions on the internet sometimes in a diary-like format.

Suzanne would need software like WordPress for her blog.

Answer:

blog, blogging

Explanation:

Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Select one: True False

Answers

Answer:false

Explanation: why would you need a powerful it security system, if they already have authorized access?


Write the difference between:
a) RAM and hard disk
b) RAM and ROM
c) Volatile memory and non-volatile memory
d) DVD and floppy disk

Answers

Answer:

RAM is used to store computer programs and data that CPU needs in real time. ... RAM data is volatile and is erased once computer is switched off. HDD,hard disk has permanent storage and it is used to store user specific data and operating system file

Answer:

RAM is used to store computer programs and data that CPU needs in real time.  RAM data is volatile and is erased once computer is switched off.

Hard disk has permanent storage and it is used to store user specific data and operating system files

RAM =  Random access memory ;is volatile memory that temporarily stores the files you are working on

ROM = Read-only memory ;is non-volatile memory that permanently stores instructions for your computer

Similarities : They are present in the computer.

Volatile memory and non-volatile memory is RAM and ROM

(d.) Floppy disk is a magnetic storage medium with only a 1.44 M capacity, while a CD is an optical disc that can store 700M CDs are based on physical dimples on the disk surface.

Floppies cannot store much at all A CD will hold more than 450 floppies.

Explanation:

What did you do over the Summer?


Answers

Answer:

I studied for SAT the whole 2 months, studying 18 hours a day...

I honestly didn't do anything because of Corona

A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

Answers

Answer:

DDoS

Explanation:

A DDoS attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS means denial-of-service.

Hope this helps! :)

An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems analysts. E. sending data.

Answers

Answer:

C. receiving data.

Explanation:

An information system interacts with its environment by receiving data in its raw forms and information in a usable format.

Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

Hence, the information system relies on the data it receives from its environment, processes this data into formats that are usable by the end users.

PLEASE HELP ME

Refer to the images to the right and identify the lettered items. Each letter refers to the image beneath it

Answers

Answer:

A. Modem

B. Ethernet

C. USB

D. FireWire

E. HDMI

F. DVI

G. VGA

Explanation:

The letters are matched with the respective images.

A. Modem

B. Ethernet

C. USB

D. FireWire

E. HDMI

F. DVI

G. VGA

What is digital information?

Digital information generally consists of data that is created or prepared for electronic systems and devices such as computers, screens, calculators, communication devices. These information are stored by cloud.

The analog signals are discrete in nature and digital signals are continuous waves.

They are converted from digital to analog and vice versa with the help of a device called modem.
Thus, all the devices in the image are matched to the correct letters.

Learn more about digital information.

https://brainly.com/question/4507942

#SPJ2

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet. Question 41 options: A) Availability B) Confidentiality C) Authenticity D) Nonrepudiation

Answers

C) Authenticity

Authenticity refers to the ability to identify the person or entity whom you are dealing on the internet.

Write a VB program to convert a temperature from Celsius to Fahrenheit and vice versa.

Answers

Answer:

Dim c As Double

Dim f As Double

Private Sub CmdClr_Click()

TxtInput.Text = “”

TxtInput.SetFocus

End Sub

Private Sub Command1_Click()

c = Val(TxtInput.Text)

If Val(c) = 0 And TxtInput = “” Then

MsgBox “Enter Any number”, vbInformation, “Result”

TxtInput.SetFocus

Else

f = 9 * c \ 5 + 32

MsgBox “Fahrenheit :” & ” ” & f, vbInformation, “Result”

End If

End Sub

Private Sub Command2_Click()

f = Val(TxtInput.Text)

If Val(c) = 0 And TxtInput = “” Then

MsgBox “Enter Any number”, vbInformation, “Result”

TxtInput.SetFocus

Else

c = (f – 32) * 5 \ 9

MsgBox “Celsius :” & ” ” & c, vbInformation, “Result”

End If

End Sub

Explanation:

An intrusion prevention system (IPS) is similar to an IDS, except that in addition to detecting and alerting, an intrusion detection system (IPS) can also take action to prevent a breach from occurring.

a. True
b. False

Answers

Answer:

The answer is "Option a".

Explanation:

The IPS  system is a type of network safety that identifies and recognized threats and prevents them from similar to IDS. It also tracks the network continually, searching for this, and gathering information from potential malicious events.  

Its core role is the program of intrusion prevention, which would be to monitor and identify or avoid any malicious activity by the IDS.  It attempts its logged and reported to network managers.

You are trying to create a user from the command line on a Linux computer. You get an error that permission is denied. What should you do?

Answers

Answer:

preface the command with sudo

Explanation:

In the scenario being described, the best course of action would be to preface the command with sudo . This is because sudo is a program Linux operating system that allows the individual user to run programs with the security privileges of another user, which usually applies to the superuser. In this scenario, this would allow the user to bypass the error message and gain access to such a task.

Tornado Alley is located in the middle of the United States, extending from Texas up through the Dakotas. The above statement is a(n) ________________.

Answers

Answer:

fact

Explanation:

because it is a information

Other Questions
What is the answer to this question? what is the answer 8/5-1/6= ive been stuck on this question forever write a letter to your incle abroad,five reasons why you want to further education Nicole is going to see a movie and is taking her 3 kids. Each movie ticket costs $14 and there are an assortment of snacks available to purchase for $4.50 each. How much total money would Nicole have to pay for her family if she were to buy 4 snacks for everybody to share? How much would Nicole have to pay if she bought x snacks for everybody to share? As part of this month's customer appreciation,iSongs is offering every fifth customer a free songdownload. Every twelfth customer gets a free videodownload. How many customers in the first 200 willreceive both the free song and free video -downloads? Totalitarianism is a form of government in which one person or political party exercises absolute control over all spheres of human life and opposing political parties are prohibited.a. Trueb. False In a race, there are 20 runners. Trophies for the race are awarded to the runnersfinishing in first through fourth place.In how many ways can first through fourth place by determined? g Government expenditure ________ change potential GDP and taxes ________ change potential GDP. Researchers recorded the forces over a short period of time (0.065 s) for three different airbag designs as well as one crash without airbags. Your task is to analyze the data from the trials listed below. Use this analysis to construct an argument about which airbag design provides the most protection, citing patterns from the data as evidence for your claim. Data Time (seconds) Design 1(kN) Design 2 (kN) 0 0 0 0.005 0 7.38 0.01 0 46.18 0.015 7.63 84.08 0.02 56.03 91.87 0.025 101.84 90 08 0.03 126 81 81 03 0.035 114.13 54.13 0.04 64 84 36.96 0.045 38.15 29.96 0.05 17.78 18.2 0.055 5.04 10.87 0.06 0 4.31 Design 3 (kN) No Airbag (kN) 0 0 0 0 8.65 2.3 33.45 5.72 83.88 232 54 147.5 222 68 111 23 67.44 77.43 16 23 36.55 4.17 22.76 0 9.43 0 0 0 0 0 O 065 0 0 0 0what is the pattern solve the following equation for B be sure to take into account whether a letter is capitalized or not.d - 3f^2 = 5BM Write a program that prompts users to pick either a seat or a price. Mark sold seats by changing the price to 0. Use overloaded methods to implement seat allocation: When a user specifies a seat (row, column), make sure it is available. When a user specifies a price, find any seat with that price. Write appropriate responses to the user if the seat is already taken, if their seat is available, or the seat number of the assigned seat if they just specified a price, etc.A theater seating chart is implemented as a two-dimensional array of ticket prices, like this:_______. 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 10 20 20 20 20 20 20 10 10 10 10 20 20 20 20 20 20 10 10 10 10 20 20 20 20 20 20 10 10 20 20 30 30 40 40 30 30 20 20 20 30 30 40 50 50 40 30 30 20 30 40 50 50 50 50 50 50 40 30 1. If p(x) = 3x + 4x - 5x +8, find p(-2). g What is the half-life for a particular reaction if the rate law is rate = (1291 M*min)[A] and the initial concentration of A is 0.250 M? solve for u: u/9.6 = 6 whats the answer I- Describo cmo se da la violencia escolar dirigida: Por los alumnos contra sus pares: __________________________ Por un docente contra los alumnos: _________________________ Los alumnos contra los docentes: ___________________________ Project management _____ describe the key competencies that project managers must develop. Clarisa is reading an article about a middle school boy who is raising money for his schools sports department. She remembers hearing an interview about a middle school student in a different country who is raising money to fix his schools roof. How does she establish a text-to-world connection? What is a reasonable domain for the data below? Como decido si un mensaje es real o ficticio? 1. Actuators apply mechanical force in the form of pressure to overcomeA. InertiaB. ResistanceC. GravityD. TorqueChoose the best answer for the question.