answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
2 years ago
11

Write the execution steps if the input is a lion.

Computers and Technology
1 answer:
balandron [24]2 years ago
7 0

Explanation:

Execution step:

1. Starting the program

2. It will get the animal name

3. Check whether the animal eats only plants. Then it prints "Herbivore". If the condition is false, it prints "carnivore".

4. Stop the program

To identify input, output and decision:

Start and Stop (oval): These are neither input nor output

Does it eat only plants?: Decision making statement ("d")

Read the names of the animals(Parallelogram): Input ("i")

Print Herbivore, Print Carnivore: Output "o"

Scenario 1: Input is lion

1. Start

2. Reads the input as "lion"

3. Check if lion eats only plants. So here it is false

4. Print "Carnivore"

5. Stop

Scenario 1: Input is Elephant

1. Start

2. Reads the input as "Elephant"

3. Check if lion eats only plants. So here it is true

4. Print "Herbivore"

5. Stop

You might be interested in
Animated graphics that are displayed on the screen after a set of time when the computer is unattended.​
yan [13]

Answer:

Tab b. CTRL+A c. Alt d. Enter 18. Animated graphics that are displayed on the screen after a set of time when the computer is unattended. a. Screen Saver b. Title Bar c. Scroll Bar d.

Explanation:

Tab b. CTRL+A c. Alt d. Enter 16. Animated graphics that are displayed on the screen after a set of time when the computer is unattended

Computer-generated motion graphics[edit]. Before computers were widely available, motion graphics were costly and time-consuming, limiting their use to high-budget filmmaking and ...

7 0
1 year ago
Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system,
goldfiish [28.3K]

The service model that Kaira’s company is using is Saas

Explanation

Kaira’s company is using Software as a Service to access their new calendaring system that has been hosted by a 3rd party vendor over the web. It is the work of the SaaS to host specific applications and to deliver these applications to customers over the cloud. With SaaS, Kaira’s company does not need to install their calendaring software on their PCs. Every useful thing they want from their calendaring system can easily be accessed over the internet. All the company will need are personalized accounts with usernames and passwords for their employees to access.

The other different types of Cloud Computing services include;

  • PaaS: A set of tools and services designed to make coding and deploying those applications quick and efficient.
  • IaaS: hardware and software that powers it all – servers, storage, networks, and operating systems.

Learn more:

What is cloud computing?

brainly.com/question/2662575

Explain the three basic types of Cloud computing

brainly.com/question/12967175

#LearnwithBrainly

3 0
2 years ago
RADIAC instruments that operate on the ionization principle are broken down into three main categories based on what?
mash [69]

Answer:

Electrical potential.

Explanation:

RADIAC Meter or instruments ( also known as radiation monitoring instruments) are measuring instruments that uses the principles of gaseous ionisation to conduct electricity flow internally to deflect the pointer for its Meter readings. These instruments can be analogue or digital.

They are used in industries to monitor the operation of certain equipments and processes. The level of electrical potential flow in the system determines the state or category of the instrument. Out of six, there are three main categories of electrical potential level.

6 0
2 years ago
Maurice has just purchased his first computer, which contains a preinstalled suite of basic software applications. He receives a
Oksanka [162]
This file will most likely _____.

A. convert itself into a different file type that his computer will recognize with one of its preinstalled software applications
5 0
2 years ago
Read 2 more answers
A file ____ includes the three or four characters that follow the dot in the filename and identify the files type.
vodka [1.7K]
A file extension includes the three or four characters that follow the dot in the file name
6 0
2 years ago
Read 2 more answers
Other questions:
  • What are the two most important network-layer functions in a datagram network? what are the three most important network-layer f
    7·1 answer
  • Jacob wants to be a Steamfitter. He just finished his associate’s degree. Which best describes what he should do next?
    10·2 answers
  • In a spreadsheet, the instructions for carrying out calculations are called __________. recalculations formulas templates macros
    13·1 answer
  • In its simplest form, communication is defined as ________.
    7·1 answer
  • A computer system uses passwords that are six characters and each character is one of the 26 letters (a-z) or 10 integers (0-9).
    13·1 answer
  • Write the definition of a function named averager that receives a double parameter and return-- as a double -- the average value
    12·1 answer
  • Design a class named Person and its two subclasses named Student and Employee. Make Faculty and Staff subclasses of Employee. A
    13·1 answer
  • Which decimal value (base 10) is equal to the binary number 1012?
    5·1 answer
  • In this exercise you will debug the code which has been provided in the starter file. The code is intended to take two strings,
    7·1 answer
  • 3. Write a program to find the area of a triangle using functions. a. Write a function getData() for user to input the length an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!