// This pseudocode segment is intended to compute and display
// the average grade of three tests for any number of students.
// The program executes until the user enters a negative value
// for the first test score.
start
Declarations
num test1
num test2
num test3
num average
housekeeping()
while test1 >= 0
mainLoop()
endwhile
endOfJob()
stop

housekeeping()
output "Enter score for test 1 or a negative number to quit"
return

mainLoop()
output "Enter score for test 2"
input test2
average = (test1 + test2 + test3) / 3
output "Average is ", average
output "Enter score for test 1 or a negative number to quit"
input tesst1
return

endOfJob()
output "End of program"
return

Answers

Answer 1

The pseudocode to calculate the average of the test scores until the user enters a negative input serves as a prototype of the actual program

The errors in the pseudocode

The errors in the pseudocode include:

Inclusion of unusable segmentsIncorrect variablesIncorrect loops

The correct pseudocode

The correct pseudocode where all errors are corrected and the unusable segments are removed is as follows:

start

Declarations

     num test1

     num test2

     num test3

     num average

output "Enter score for test 1 or a negative number to quit"

input test1

while test1 >= 0

     output "Enter score for test 2"

     input test2

     output "Enter score for test 3"

     input test3

     average = (test1 + test2 + test3) / 3

     output "Average is ", average

     output "Enter score for test 1 or a negative number to quit"

     input test1

endwhile

output "End of program"

stop

Read more about pseudocodes at:

https://brainly.com/question/11623795


Related Questions

A team member who does not feel comfortable disagreeing with someones opinion in front of the team would most likely come from a

Answers

Answer:

discussions and decisions made about public policy

Explanation:

Most graphics software programs give you the choice to work in either RGB or CMYK. What are these specifications called?
A.
digital codes
B.
color spaces
C.
computer graphics
D.
artwork

Answers

A - digital codes

Hope I’m right

Answer:B

Explanation:

It is possible to publish a presentation online. True False

Answers

Answer:

It should be true

Explanation:

I don't see why it wouldn't

The first three elements of the Continuous Delivery Pipeline work together to support delivery of small batches of new functionality which are released in accordance with what?

Answers

Answer:

is Market needs

Explanation:

The first three elements of the continuous delivery pipeline mediates the support to the small batches thereby to be released in accordance with the market demand.

What is continuous delivery pipeline?

The continuous delivery pipeline can be given as the software application that enables the development of the new code with the automation to speed.

The first three elements of the continuous delivery pipeline are Continuous Exploration (CE), Continuous Integration (CI), and Continuous Deployment (CD).

The elements mediates the support to the small batches to be released in accordance with the market demand.

Learn more about continuous delivery, here:

https://brainly.com/question/14402781

#SPJ2

Develop a program to sort a file consisting of bonks details in the alphabetical order of author names. The details of books include book id, author_name, price. no of pages, publisher, year of publishing
Please provide C++ program for above question.​

Answers

Use the knowledge in computational language in C++ to write the a code with alphabetical order of author name.

How to define an array in C++?

An Array is a set of values ​​arranged in lists and accessible through a positive numeric index. So, we have that each position of our Array is a variable of the type of our Array, so we have to have a way to initialize this set of variables.

#include <iostream>

#include <iomanip>

#include <fstream>

#include <string>

using namespace std;

struct Book {

   string title;

   string author;

};

const int ARRAY_SIZE = 1000;

Book books [ARRAY_SIZE];

string pathname;

ifstream library;

int LoadData();

void ShowAll(int count);

void ShowBooksByAuthor(int count, string name);

void ShowBooksByTitle(int count, string title);

void sortByTitle(int count, string title);

void sortByAuthor(int count, string author);

int main()

{  

   int count = 0;

   char selector = 'q', yesNoAnswer = 'n';

   string name;

   string title;

     cout << "Welcome to Forrest's Library Database." << endl;

   cout << "Please enter the name of the backup file: ";

   getline(cin, pathname);

   LoadData();

   count = LoadData();

   cout  << count << " records loaded successfully." << endl;

   do

   {

       cout << endl << "\t(S)how All, Search (A)uthor, Search (T)itle, (Q)uit: ";

       cin >> selector;

       selector = toupper(selector);

       switch(selector)

       {

           case 'S':

               sortByTitle(count, title);

               if (count <= 0)

                   cout << "No counts found!\n";

               else

                   ShowAll(count);

               break;

           case 'A':

               sortByAuthor(count, name);

               cout << "bookAuthor: ";

               cin.ignore();

               getline(cin, name);

               if (count <= 0)

                   cout << "No records found!\n";

               else

                   ShowBooksByAuthor(count, name);

               break;

           case 'T':

               sortByTitle(count, title);

               cout << "bookTitle: ";

               cin.ignore();

               getline(cin, title);

               if (count <= 0)

                   cout << "No records found!\n";

               else

                   ShowBooksByTitle(count, title);      

               break;

       }

   }

   while (selector != 'q' && selector != 'Q');

   return 0;

}

int LoadData()

{

   int count = 0;

   int i = 0;

   library.open(pathname);

   ifstream library(pathname);

   if (!library)

   {

       cout << "Cannot open backup file" << endl;

       return 0;

   }

   while (!library.eof())

   {

       getline(library, books[count].title);

       getline(library, books[count].author);

       count++;

   }

   return count;

}

void ShowAll(int count)

{

   for (int i = 0; i < count; i++)

   {

      cout << books[i].title << " " << "(" << books[i].author << ")" << endl;

   }

}

void ShowBooksByAuthor(int count, string name)

{

   int j = 0;

   for (int i = 0; i < count; i++)

   {

       if(books[i].author.find(name) < 100)

       {

           cout << books[i].title << " " << "(" << books[i].author << ")" << endl;

           j++;

       }

   }

   cout << j << " records found";}

void ShowBooksByTitle(int count, string title)

{

   int j = 0;

   for (int i = 0; i < count; i++)

   {

       if(books[i].title.find(title) < 100)

       {

           cout << books[i].title << " " << "(" << books[i].author << ")" << endl;

           j++;

       }

   }

   cout << j << " records found";

}

void sortByTitle(int count, string title) {

   string temp;

   for (int i = 0; i < count; i++) {

       for(int j = 0; j < count - i; j++) {

           if (books[j].title > books[j + 1].title) {

               temp = books[j].title;

               books[j].title = books[j + 1].title;

               books[j + 1].title = temp;

           }

       }

   }

}

void sortByAuthor(int count, string name) {

   string temp;

   for (int i = 0; i < count; i++) {

       for(int j = 0; j < count - i; j++) {

           if (books[j].author > books[j + 1].author) {

               temp = books[j].author;

               books[j].author = books[j + 1].author;

               books[j + 1].author = temp;

           }

       }

   }

}

See more about C++ at brainly.com/question/19705654

Luke is working on a layout for a catalog. He adds cross lines on the four corners of the layout to mark out a small extra margin. What are these lines called?
A.
edge
B.
dark
C.
index
D.
trim

Answers

Cross lines that are added on the four corners of a layout to mark out a small extra margin is called: D. trim.

What is layout design?

Layout design can be defined as a graphical design process that involves the use of one or more grids for the design of a catalog and system, so as to make the designs visually appealing to end users.

In a layout design, trim refers to the cross lines that are added on the four (4) corners of a layout to mark out a small extra margin.

Read more on layout design here: https://brainly.com/question/13732745

An onsite technician at a customer site installed a PERC 10 card in an R630 server. The first time the server booted, the customer was unable to see the drives. The customer restarted the server a second time. This time, the server is not booting at all. An issue with the installation of an unsupported PERC card is suspected. What is the next best step to take?

Answers

The next best step to take in the situation above is to remove the failed card from the system and one can use a replacement card to see if the same issue will arise.

What is an IL PERC card?

PERC is a term that connote  Permanent Employee Registration Card. If a person holds this card, it is a card that shows that one have undergone some specific state and federal background checks and fingerprinting to function as a security guard in Illinois.

The Potential employers of security guards is one that needs applicants to have a PERC card and when the card fails, it may be due to the machine or faulty card or corrupt card.

Learn more about installation  from

https://brainly.com/question/17506968

Define a function FindLargestNum() with no parameters that reads integers from input until a negative integer is read. The function returns the largest of the integers read

Answers

The FindLargestNum program is an illustration of function; where its execution is done when its name is called or evoked

The function FindLargestNum

The FindLargestNum function written in Python, where comments are used to explain each action is as follows:

#Thie defines the FindLargestNum function

def FindLargestNum():

   #This gets the first input

   num = int(input())

   #This initializes the minimum value

   maxm = num

   #The following is repeated until the user enters a negative input

   while num >= 0:

       #This determines the largest input

       if num > maxm:

           maxm = num

       #This gets the another input

       num = int(input())

   #This prints the largest input

   print(maxm)

Read more about functions at:

https://brainly.com/question/24941798

• Do you think documentaries are best delivered in media such as films or documentary?
• Do you think only thru survey can sustain authenticity of the information need within a study?​

Answers

Answer:

I think documentaries are the best delivered in media format because it adds intrigue and lowers boredom.

I think surveys are nice for studies, but not good enough because people can click answers that they know to be false, at least, for them.

"You have created a Word document named apple.docx using Microsoft Word. What type of a file is apple.docx ? Select all that apply"

Answers

The type of a file that is in  apple.docx is Executable program file.

What is an executable file?

An executable file (EXE file) is known to be a type of computer file that has a encoded sequence of codes or instructions that the system often work on  when the user is said to clicks the file icon.

Note that Executable files are known to have an EXE file extension, and there are a lot of other executable file formats. The type of a file that is in  apple.docx is Executable program file.

Learn more about Word document from

https://brainly.com/question/25567167

Type the correct answer in the box. Spell the word correctly.

Which firewall monitors traffic from the DMZ to the LAN?

When a DMZ is set up using dual firewalls, the___

-end firewall monitors traffic moving from the DMZ toward the LAN while the ___

firewall monitors the traffic from the Internet toward the DMZ.

Answers

The firewall that monitors traffic from the DMZ to the LAN is the second, or internal (dual-firewall)

Which firewall manages traffic from the DMZ to the LAN?

In this kind of traffic, the second, or internal, firewall is known to be the one that gives room for traffic to move from the DMZ to the internal network.

Note that the dual-firewall approach is seen as a very secure way due to the fact that  two devices have to be compromised before any kind of attacker can be able to gain access into the internal LAN.

When a DMZ is set up using dual firewalls, the web server is placed inside the DMZ and the private network is often placed behind the DMZ.

Learn more about firewall from

https://brainly.com/question/13693641

6. Create lookup functions to complete the summary section. In cell I6, create a formula using the VLOOKUP function to display the number of hours worked in the selected week. Look up the week number in cell I5 in the range A17:G20, and return the value in the 2nd column. Use absolute references for cell I5 and the range A17:G20.

Answers

Answer:

Reporting period hours Timesheet Due Name 44260 Period Start 44228 Period End 40965 Summary Balances Date Completed 43722 Week # 1 Period Start Period End Worked

In programming 2+6 is an example of what math

Answers

Answer:

[tex]beinggreat78~here~to~help.[/tex]

2 + 6 in programming is an example of math. It is the same as in the real world. Plus signs in coding are also a form of string concatenaction, the term used for combining two strings into one, or a variable into a string.

A set of activities that performs across the organization creating as output of values to the customer
a.
Business process
b.
Customer process
c.
Quality process
d.
Software process
e.
Integrated process

Answers

the correct answer is A : Business Process

Strategies of Green computing include:

Answers

Answer:

Equipment recycling, reduction of paper usage, virtualisation, cloud computing, power

Which method adds 10 to the right end of the array?
myArray.
insert
(10)

Answers

JavaScript has a set of mutator functions that allow you to modify the contents of an array without referencing the individual elements.To add to to myArray we us the push() method

Adding Elements to an Array

To add to to myArray we us the push() method

(10)

myArray.push(10)

There are two mutator functions for adding elements to an array: push() and unshift(). The push() function adds an element to the end of an array:

var nums = [1,2,3,4,5]; print(nums); // 1,2,3,4,5 nums.push(6);

print(nums); // 1,2,3,4,5,6

var nums = [1,2,3,4,5]; print(nums); // 1,2,3,4,5 nums[nums.length] = 6; print(nums); // 1,2,3,4,5,6

Learn more about arrays here:

https://brainly.com/question/24275089

It would be Array.append(10), so append is the answer.

Ensure that the Facilities worksheet is active. Enter a reference to the beginning loan balance in cell B12 and enter a reference to the payment amount in cell C12.

Answers

A reference value to the beginning loan balance in cell B12 is E6 ($325,000.00) while a reference to the payment amount in cell C12 is $B$6.

What is a spreadsheet?

A spreadsheet refers to a document which comprises cells that are arranged in a tabulated format with rows and columns. Also, a spreadsheet is typically used in various fiedls for calculating, sorting, formatting, arranging, analyzing, and storing data on computer systems.

In this scenario, a reference value to the beginning loan balance in cell B12 would be E6 with a value of $325,000.00 while a reference value to the payment amount in cell C12 would be $B$6.

In conclusion, cell B12 will always show the beginning loan balance and cell C12 will always show a static payment amount for all the other cells in this spreadsheet.

Read more on spreadsheets here: https://brainly.com/question/4965119

This week, we have covered network management which include topics such as System message log, SNMP, Netflow, QoS, VPN, and default gateway redundancy. Discuss one feature you would implement in your network and how you use it.

Answers

There are lot of system network. I would love to implement the use of VPN in my network.

What is a gains of implementing a VPN?

The use of VPNs is one that helps a person to have a better form of total security, it also make performance better, remote access, anonymity, an others.

Conclusively, Note that the use of VPN can be  affordable as it is cheap and it can prevent hackers  having access to your data or system.

Learn more about VPN from

https://brainly.com/question/25554117

How does a workstation differ from a server in terms of price processing power storage and computer memory

Answers

Workstations are laptops and PCs that quickly perform complex, technical tasks such as digital content creation and detailed analysis. Servers are software and hardware that store data, manage network resources, and fulfill client requests.

Which of the following is a characteristic of TIFFs?

universal standard for image file formats

cross-platform

the one version of TIFF that exists

only available as a vector graphic
please help

Answers

Answer:

What are the characteristics of a TIFF file?

A TIFF file supports grayscale as well as RBG,CMYK, and LAB color space. The format allows a color depth of up to 16 bits per color channel and is therefore ideal for data exchange during a RAW conversion. The abbreviation TIFF, or more rarely TIF, stands for “Tagged Image File Format”.

Answer:

universal standard for image file formats

Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false questions. Each correct answer is worth 2 points.

Answers

The quiz program is an illustration of loops and conditional statements

Loops are used to perform repetitionConditional statements are used to make decisions

The quiz program

The quiz program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

int main(){

   //This prints the instruction

   cout<<"Enter T/t for True; F/f for False\n";

   //This initializes the question

   string questions[5] = { "Q1", "Q2", "Q3", "Q4", "Q5"};

   //This initializes the correct options

   char options[5] = { 'T','T','F','F','T'};

   //This declares the user response

   char opt;

   //This initializes the score to 0

   int score = 0;

   //This loop is repeated 5 times

   for (int i = 0; i < 5; i++){

       //This prints the current question

       cout << i + 1 <<". "<<questions[i]<<"\nAnswer: ";

       //This gets the user response

       cin>>opt;

       //If the user response is correct

       if(toupper(opt) == options[i]){

           //The score is incremented by 2

           score+=2;

       }

   }

   //This prints the total score

   cout<<"Score: "<<score;

   return 0;

}

Read more about loops at:

https://brainly.com/question/19347842

6. Which of the following items is not a storage
medium?
A. Plotters
B. Zip disk
C. Hard disk
D. Memory stick

Answers

Answer:

Plotters

Explanation:

A 'plotter' is an external hardware device like a printer used with a computer to 'print vector graphics' - basically in english it no hold storage like that

Which of the following is a valid byte?

11100
11011011
00000000
10022011

Answers

Answer:

11011011

00000000

Explanation:

10022011 cant be an answer because bits are composed of 0s and 1s

and 11100 is too small.

If you determine that the hard drive is experiencing excessive use but the Windows Experience Index reports that memory is the system bottleneck, which component do you upgrade first: memory or the hard drive? Why?

Answers

The reason why is it is good to use an Upgrade memory is because low amounts of memory can lead to much use of the hard drive and based n the fact that it is not costly to upgrade memory than to upgrade the hard drive.

What is upgrading memory?

This is known to b an act done so as to improve the performance of a computer.

It is often known as a RAM or system memory upgrade. An upgrade implies that one is adding memory modules along with the ones that were there or replacing the old ones. It is less costly when compared to hard drive upgrade.

Learn more about Upgrade memory  from

https://brainly.com/question/13196228

1. What is TRUNC for Delphi
programming language?
Please explain in at least 200
words.

Answers

The Trunc function cut off a floating-point value by removing the fractional part. The Trunc  function often brings back an integer result as it is not a real function.

What is the Trunc function in Delphi?

When you look at the Delphi code, the Trunc function is known to be a fuction that reduces or cut off a real-type value and make it into an integer-type value.

Note that X is a real-type expression and so the Trunc is said to often brings back an Int64 value that is meaning the value of X approximated to zero and when the cut of value of X is not found in  the Int64 range, an EInvalidOp exception is brought up.

Learn more about programming language from

https://brainly.com/question/8151764

QUESTION
1.1 List 10 TEN advantages of word processing.

Answers

Quality : It produces error free documents. The spell and grammar check in word processing makes the document to be neat and error-free. We can get multiple copies of excellent formatted nature in word Processing.

! Storage of Text : We can take any number of copies with word processor. Not only that, if we need the same document with some slight changes, we need not type the same letter again. Just by making some slight changes, we can obtain a modified copy easily.Time Saving : We can get any number of copies of document in future without retyping. We can get the copy of document on any printer.

! Security : We can protect the documents in word processing by giving passwords. So there is a less chance of viewing the documents by unauthorized persons.

! Dynamic Exchange of Data : We can have dynamic exchange of objects and pictures from other documents into word processing documents. The documents can be linked to each other. 

Improving Efficiency and Accuracy. Besides simply saving time, word processing offers ways to improve workers' efficiency and accuracy. Word processors contain software to automatically correct common errors and identify misspellings, improving overall speed and reducing

these may be some of them

In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North America. They taxed goods such as sugar and tea and even placed a tax on the printing of documents. These actions angered the colonists, who thought that taxation was unfair since they had no representation in the British government. For this reason, a group of colonists dumped hundreds of chests of tea from Britain into Boston Harbor in 1773, in what became known as the Boston Tea Party. As a result, England passed a series of harsh new laws to punish the colonists, further angering them. The Continental Congress met to voice the colonists' grievances, and eventually, on July 4, 1776, the colonists declared their independence from Britain.

Answers

Answer:

Taxes and other laws imposed on the colonies led the colonists to declare independence from England.

Explanation:

During the British government, laws taxes, and other laws increased in the colonies which led the colonists to declare independence from England.

How colonists declared their independence from Britain?

As a result, the British were forced to deploy a large army in North America on March 22, 1765, the British parliament passed the Stamp Act.

Which aimed to raise money by levying a tax on all legal and official papers and publications that were being distributed across the colonies. The Stamp Act angered the American colonists, which moved fast to oppose it.

A direct appeal to Parliament was virtually difficult due to the colony's extreme distance from London, the heart of British politics.

Therefore to raise money and increase taxes and laws colonists declared their independence on 4 July 1776 from Britain.

Learn more about the British government, here:

https://brainly.com/question/2848503

#SPJ5

You can always trust information that comes from websites ending in. . com

Answers

Answer:

No, Don't go there I can name more than 3 websites that end in ".com" that u cant trust.

Explanation:

A desktop is one kind of computer. Name two other kinds?​

Answers

Answer:

Notebook, supercomputer.

Explanation:

Notebooks are laptops, usually low performance.

Supercomputers are the best performing computers in the world.

Answer:

super computers and mainframe computers

Explanation:

these computers were used way before desktop computers

what impact of information communication technology have on the environment about electronic waste, use of electricity?​

Answers

Answer:

When e-waste is exposed to the heat, toxic chemicals are released into the air damaging the atmosphere.

Explanation:

Other Questions
Draw the product of the reaction. Draw any hydrogens on oxygen and nitrogen, where applicable. Can someone answer this in Spanish? Tasha makes fun of Jeffery at work, harasses him, and calls him names. Howmight an HR manager overcome this situation of office bullying? Please help fast!!!!How many solutions does the equation y + 12 = y + 10 + 2 have?O ZeroOneO TwoO Infinitely many How did the climate zone and physical features impact the success of these major ancient civilizations/empires (greece, china, and rome)? NEED HELP!! THX! please answer part b, I already have part a. how a lack of responsible citizenship can lead to further cases of human rights violations within a community Which sentence with acompound subject joined by"or" has correct subject/verbagreement?(Use the Proximity Rule!)A. Either Kelly or her brother are going tothe mall.B. Either Kelly or her brother is going to themall.C. Either Kelly or her brothers is going tothe mall.D. Either Kelly or her sisters is going to themall. James believes that he has a limited time left to live. He contemplates the meaning of life frequently and tries to spend as much time as he can with his family. Which theory would BEST predict this behavior Giving BrainliestWhich choice is an example of the use of sound energy in everyday life?batteries powering toysfireplaces keeping people warmlights helping people seecar horns preventing accidents Find the sum of 3.0478 and 4.92 using the correct number of significant digits. A. 7.967 B. 7.97 C. 7.9 D. 8 Which expression should you simplify to find the 90% confidence interval,given a sample of 65 people with a sample proportion of 0.42?O A. 0.421.645-0.42165OB. 0.42 650.42(10.421.645O c. 0.42 +1.645.0.42(1-0.42)65O D. 0.42 +1.645.V0.42(10.42)65 What type of cell is the cell in this diagram ? falling action of ant and the elephant? The bakers at healthy bakery can make 320 bagels in 10 hours. How many bagels can they make in 15 hours? What was the rate per hour? Explain how setting a health goal and meeting it can build confidence and self-esteem. Find the exact value, without acalculator.30sin 15 sintan 15 =2cos 15 302COSII[ ? ] - [] + [Enter please answer this art question Heres another geometry workbook question I need help with! Beinggreat78, this is mostly for you. but whoever gets it right can have brainliest, but answer ASAP!