write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

please hurry i need urgent

Answers

Answer 1

Answer:

Algorithm

1. Begin

2. num_bottles = 0

3. While num_bottles != 500

   3.1 Create bottle

   3.2 num_bottles = num_bottles + 1

4. Switch off machine

5. End

The flowchart has been added as an attachment

Explanation:

Begin algorithm

1. Begin

Initialize bottles to 0

2. num_bottles = 0

Repeat loop until 500 bottles is created

3. While num_bottles != 500

Create a new bottle

  3.1 Create bottle

Increment the number of bottles by 1

  3.2 num_bottles = num_bottles + 1

End Loop

Switch off the machine after loop ends

4. Switch off machine

End algorithm

5. End

Write An Algorithm And Draw A Flowchart For Switching Off A Machine After It Has Made 500 Glass Bottles.

Related Questions

Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.

Answers

Answer:

Lets us take k, m = 10, 40

q = 0

i = k

while i <= m:

   if int(i*0.5)*2 == i:

       q += 1

   i += 1

You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?

Answers

Answer:

Transactional File System

Explanation:

To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.

Write a program that takes the account's present value, monthly interest rate, and the number of months that the money will be left in the account as three inputs from the user. The program should pass these values to a function thatreturns the future value of the account, after the specified number of months. The program should print the account's future value.

Answers

Answer:

Assuming this is going to de made with python:

def main():

   currentValue = float(input("Current value of account: "))

   monthlyInterestRate = float(input("Monthly interest rate: "))

   monthsToWait = int(input("Amount of months the money will be left in the account: "))

   monthlyInterestRateToPercent = monthlyInterestRate / 100

   futureValue = float(round((currentValue + currentValue * monthlyInterestRateToPercent * monthsToWait), 2))

   print("The future value of this account will be " + str(futureValue))

main()

Explanation:

Hope this helped. Also, if this is incorrect please tell me what needs to be added so I can add it for future viewers. Have a good day :)

Tests of controls in an advanced computer system Can be performed using actual transactions or simulated transactions. Can be performed using only actual transactions because testing of simulated transactions is of no consequence. Is inadvisable because they may distort the evidence in master files. Is impracticable because many procedures within the computer processing activity leave no visible evidence of having been performed.

Answers

Answer:

Can be performed using actual transactions or simulated transactions.

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

In an advanced computer system, test of controls can be performed using actual transactions or simulated transactions.

Which category was originally developed to protect both digital and hard-copy sensitive information?

Answers

Answer:

Information assurance

Explanation:

Information assurance was originally developed to protect both digital and hard-copy sensitive information.

There are many best practices for digital recordings. Select the three best practices from the list below. select the best microphone for your situation use a variety of surroundings and settings be conscious of your lighting wear headphones while listening to your recording only film the footage you need

Answers

Explanation:

1. Wear your headphones while listening to your recording: It is important to make sure there are no echoes or background noises in the room.

2. Pay attention to your surroundings: It is important to eliminate any unwanted motions or unwanted noises associates with motion.

3. Use a tripod or a table microphone: It is important not to be distracted by background noise or confuse it with background noise from your recording.

Bruce frequently works with a large number of files. He is noticing that the larger the files get, the longer it takes to access them. He suspects that the problem is related to the files being spread over the disk. What utility can be used to store the files contiguously on the disk

Answers

The utility that could be stored for the files is disk defragmenter.

The following information related to the disk defragmenter is:

In the case when the program saved the file on the disk so here the file should be put onto the empty space. It considered all the parts & pieces on each and every file and the same should be stored in one place.Also, the programs should be kept in one place, and the space that is not used should be on the hard disk.

Therefore we can conclude that The utility that could be stored for the files is disk defragmenter.

Learn more about the disk here: brainly.com/question/12656426

Universal Containers uses a custom object within the product development team. Product development, executives, and System Administrators should be the only users with access to records of this object. Product development needs read/write access to all the records within the object, while the executives should only be able to view the records. How can the System Administrator configure the security model to meet these requirements

Answers

Answer:

The answer is below

Explanation:

Considering the scenario described in the question, the right answer is that, the System Administrator would configure the security model to meet these requirements by setting the Organization-Wide Defaults for the custom object to Private.

Then follow by giving the Product Development Modify All for the object; And finally, give the Executive Profile View All access.

What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>

Answers

Explanation:

the output password is isalpha()

You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of their software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this

Answers

Answer:

Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.  

Explanation:

The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.

List out differences in the ways global communities were formed before and after the advent of the internet and social media.

Answers

Answer:

is a remarkably complex technical system built on the creative contributions of scientists around the world from the 1950s to the present. Throughout its evolution, the Internet and other networks have been promoted by governments, researchers, educators, and individuals as tools for meeting a range of human needs. A combination of high-level policy and grassroots improvisation has produced social benefits including easier and more widespread access to computers and information; increased scientific collaboration; economic growth; the formation of virtual communities and an increased ability to maintain social ties over long distances; the democratization of content creation; and online political and social activism. The Internet’s rapid growth has also spawned technical crises, such as congestion and a scarcity of network addresses, and social dilemmas, including malicious and illegal activities and persistent digital divides based on income, location, age, gender, and education. Such problems continue to demand creative solutions from scientists, policy makers, and citizens.

Several general themes characterize the technical development of the Internet. First, from the 1950s to the present there has been a steady increase in the size of data networks and the variety of services they offer. Rapid growth and diversity have forced network designers to overcome incompatibilities between computer systems and components, manage data traffic to avoid congestion and chaos, and reach international agreement on technical standards. These challenges have led to fundamental advances in research areas such as operating systems and queuing theory. A second trend has been the modeling of network functions as a series of layers, each of which behaves according to a standard protocol, a set of rules for interaction that is implemented in software or hardware. Layering reduces the complexity of the network system and minimizes the amount of standardization necessary, which makes it easier for networks to join the Internet. A third important feature of the Internet’s technical development has been an unusually decentralized and participatory design process. This has opened the system to innovation from a variety of directions and has encouraged informal worldwide collaboration. The following sections describe some of the major milestones in the evolution of the Internet and its predecessors.

what is internet?
what is online?​

Answers

Answer:

internet: The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

online: controlled by or connected to a computer., while connected to a computer or under computer control.

can you open a privacy password​

Answers

yes you can, you just need the password to change it to an open password.

hardware and software are........... to each other​

Answers

Answer:

Hardware and software are interconnected to each other​

Hope this is what you´re looking for!

What is a protocol in digital technology plwwes help

Answers

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?

groups
tabs
sections
properties

Answers

Answer:

tabs

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.

A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.

Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.

Answer:

B, tabs

Explanation:

edge 2021

Which formatting group would commonly be used for monetary figures?

number
general
accounting
currency

Answers

Answer:

currency.

Explanation:

A word processor can be defined as a software application or program designed to avail the end users the ability to type and format text documents for various purposes.

Some examples of word processors are Notepad, Microsoft Word, etc.

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

Formatting in Microsoft Word refers to the appearance of texts in a document.

Basically, to format a text typically involves performing tasks such as, bold, underline, italics, font-size, font-types, color, etc.

The commands to perform the above tasks are mainly found in the format menu of the Home tab.

In Microsoft Word, you can set the display format for date, percentage, number, and currency (monetary figures). Thus, this format styles define how these values are displayed in charts and tables.

In this context, the formatting group which is commonly used for monetary figures (numerical data) such as dollar, euro, yen, naira, etc., is called currency.

Answer:

I think the answer is D

Have a good day!

A security operations team was alerted to abnormal DNS activity coming from a user's machine. The team performed a forensic investigation and discovered a host had been compromised. Malicious code was using DNS as a tunnel to extract data from the client machine, which had been leaked and transferred to an unsecure public Internet site. Which of the following BEST describes the attack?
A. Phishing
B. Pharming
C. Cache poisoning
D. Data exfiltration

Answers

Answer:

D. Data exfiltration

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, data exfiltration, etc.

The type of attack in this scenario is best described as data exfiltration.

Data exfiltration can be defined as a form of data security breach that typically involves an unauthorized transfer of data from a host computer by using a malware and a malicious code.

Hence, data exfiltration occurs when a malicious code uses a domain name server (DNS) as a tunnel to extract data from an end user's computer (client machine) and transferring it to an unsecure public Internet site.

A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?

Answers

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

You make a purchase at a local hardware store, but what you've bought is too big to take home in your car. For a small fee, you arrange to have the hardware store deliver your purchase for you. You pay for your purchase, plus the sales taxes, plus the fee. The taxes are 7.5% and the fee is $20. (i) Write a function t(x) for the total, after taxes, on the purchase amount x. Write another function f(x) for the total, including the delivery fee, on the purchase amount x. (ii) Calculate and interpret (f o t)(x) and (t o f )(x). Which results in a lower cost to you

Answers

Answer:

[tex]f(x) = 1.075x[/tex]

[tex]t(x) = x + 20[/tex]

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]

[tex](t\ o\ f)(x) = 1.075x + 20[/tex]

Explanation:

Given

[tex]Tax = 7.5\%[/tex]

[tex]Fee = \$20[/tex] -- delivery

Solving (a): The function for total cost, after tax.

This is calculated as:

[tex]f(x) = Tax *(1 + x)[/tex]

Where:

[tex]x \to[/tex] total purchase

So, we have:

[tex]f(x) = x * (1 + 7.5\%)[/tex]

[tex]f(x) = x * (1 + 0.075)[/tex]

[tex]f(x) = x * 1.075[/tex]

[tex]f(x) = 1.075x[/tex]

Solving (b): Include the delivery fee

[tex]t(x) = x + Fee[/tex]

[tex]t(x) = x + 20[/tex]

Solving (c): (f o t)(x) and (t o f)(x)

[tex](f\ o\ t)(x) = f(t(x))[/tex]

We have:

[tex]f(x) = 1.075x[/tex]

So:

[tex]f(t(x)) = 1.075t(x)[/tex]

This gives:

[tex]f(t(x)) = 1.075*(x + 20)[/tex]

Expand

[tex]f(t(x)) = 1.075x + 21.5[/tex]

So:

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex]

[tex](t\ o\ f)(x) = t(f(x))[/tex]

We have:

[tex]t(x) = x + 20[/tex]

So:

[tex]t(f(x)) = f(x) + 20[/tex]

This gives:

[tex]t(f(x)) = 1.075x + 20[/tex]

We have:

[tex](f\ o\ t)(x) = 1.075x + 21.5[/tex] ---- This represents the function to pay tax on the item and on the delivery

[tex](t\ o\ f)(x) = 1.075x + 20[/tex] --- This represents the function to pay tax on the item only

The x coefficients in both equations are equal.

So, we compare the constants

[tex]20 < 21.5[/tex] means that (t o f)(x) has a lower cost

You have been hired to perform a penetration test for an organization. You are given full knowledge of the network before the test begins. Which type of penetration test are you performing

Answers

Answer:

If you are performing a penetration test with knowledge you are known as a white-hat hacker.

write the step by approach to re saving a document using the save as option

Answers

Press save as and then choose your location to save it and then click save

outline the steps involved in signing into your account​

Answers

You put in your username or email and then you put in your password! It’s as simple as that :D

hlo plss help.
.....,, ​

Answers

Answer:

please sulto garera kichnu hola

Answer:

a) Analog computer

b) Laptop

c) super computer

d) Microcomputer

e) Hybrid computer

f) Digital computer

g) Laptop computer

Please mark me as brainlist

What is the definition of stream cipher? A. Cryptography wherein two keys are used: one to encrypt the message and another to decrypt it B. A cryptographic method in which someone chooses a number by which to shift each letter of a text in the alphabet and substitute the new letter for the letter being encrypted C. A form of cryptography that encrypts the data as a stream, one bit at a time D. A method other than brute force to derive a cryptographic key

Answers

Answer:

C. A form of cryptography that encrypts the data as a stream, one bit at a time

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cyber security, encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext.

Typically, an information or data that has been encrypted can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

A stream cipher is a form of cryptography that is typically designed to encrypt a stream of data, one bit at a time. Thus, each bit corresponds to series of information within a data stream and they are encrypted one after the other.

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings.

Answers

Answer:

memo

Explanation:

Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings

Research and describe plug-ins and their usage in graphic design.

Answers

Answer:

Plug-ins are software developed to work with another software that is already installed in the computer. They are basically add-on software that enhance a functionality of an existing software. These plug-ins can be used for different purposes based on which software they support. There can be plug-ins for search engines, audio-video players, photo-editing software, graphical design software, and more.

Plug-ins may be developed by the same company which developed the software that the plug-in is supposed to work with. It may also be developed by independent developers who just want to solve or add an element to the existing features of a software.

Plug-ins are mostly free and are released after the target software is tested and released.

Plug-ins offer a lot of assistance in graphical design. It works with the design software for adding or enhancing affects and styles to the original work. Some of the functions that popular plug-in software provide are:

• to improve color, sharpness, and focus (perspective) of the images

• to create (and enhance) natural lighting effects within the image

• to sharpen or define (emphasize) particular parts of the image

• create motion blur

• change point-of-focus of the image

• alter the level of opacity of brushes

• alter the size of brush strokes (different from the ones that already exist)

• Control and enhance the intensity of dark areas in an image

• eliminate distortion due to camera shake

• create metallic edges for elements in the image

• introduce mood and blended contrast effects

Explanation:

This is what it said when I submitted my answer

a. Fill in the blanks with suitable words: A software that controls and manages all the activities of the computer ... b. A software that converts the program written in any programming language into machine language.. A software that is designed to perform specific tasks for the user c. d. A software package used for creating text document e. A software package used for editing images​

Answers

Explanation:

i don't know

How would you approach a friend that you suspect is addicted to technology?

Answers

Ask them to go out on a picnic or something that doesn’t involve technology and if they bring up excuses, tell them that it’s not healthy to be on their phones or other devices all the time.

You would approach a friend that you suspect is addicted to technology in numerous ways. Some of them are as follows:

Guide that individual towards tour and travel which can not include technology. Advise him to give tips on meditation and its benefits.Plan a regular schedule for exercise. Try to give the advantages of being familiar with family members.

What are the disadvantages of technology?

The disadvantages of technologies are as follows:

It stimulates social isolation and loneliness.Complete waste of time.It builds negative impacts on young students. Gradual degradation of mental health and memory.

According to the context of this question, technology addiction becomes normal in the present scenario. So, in order to prevent yourself and your family members from these traps follow some well-determined and strict routine and try to spend time with the family members, games that do not involve technology, meditation, exercise, etc.

Therefore, you would approach a friend that you suspect is addicted to technology in numerous ways. Some of them are well mentioned above.

To learn more about Technology addiction, refer to the link:

https://brainly.com/question/9552314

#SPJ5

write a program to check the password( qbasic)​

Answers

Answer:

Assuming this is in python:

def check_password(password):

   

   correct_password = "qbasic"

   

   if password == correct_password:

       return True

   else:

       return False

def main():

   

   user_input = input("Type in your password: ")

   

   if check_password(user_input):

       print("Correct!")

   else:

       print("Wrong, try again")

     

       

main()

Explanation:

Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.

Have a good day :)

Other Questions
can someone pls help w finding the x and y intercepts of this? y=x^2-2x Can someone help me please will Mark brainliest Darryl has written 60 percent, or 12 pages, of his history report. Darryl wants to figure out how many total pages he needs to write. Darryls work is shown below. Step 1: Write 60 percent as a ratio. StartFraction part Over whole EndFraction = StartFraction 60 Over 100 EndFraction 7. How did industrialization effect farmers?A. Farms were abandoned as people moved to the cities.B. Over production led to low crop prices6. Farmers began to use semi-trucks to ship crops.D. Railroad rates fell drastically. 2-3 paragraph summary about ww 1. I need it in like about 3 hours? Given a sphere with radius r, the formula 4x1/2 givesA. the volumeB. the surface areaC. the radiusD. the cross-sectional area what is the y coordinate of the solution What is the meaning of habilitator? A polypeptide can be made up of a chain of as many as _______ amino acids. hi guys good afternoon Which behavior would best describe someone who has integrity ? a ) Alerting a supervisor when a coworker comes in late b ) Putting off tough tasks until the last minute c ) Following through on a promise d ) Signing in for a coworker who's running late What is the length of segment VT? value of x in 2x-7=35 is Equimolar solutions of A and B are mixed and the reaction is allowed to reach equilibrium. Write down the reactio that correctly describes the relative concentrations at equilibrium? Read the following passage. Write the correct article in each blank space. If no article is needed, leave the space blank. The first one has been done for you. Articles - a, an, theJohn lives in ..an.. apartment with his mom, dad and sister Katy. (1) apartment has three bedrooms,(2)... kitchen,(3).... bathroom and (4) living room. Johns mom works in (5).......office and his dad stays at (6).... home and looks after (7)...... apartment. He spends much of his time in (8).......kitchen, preparing meals. John and Katy help their dad with (9)....housework. John likes using (10).. vacuum cleaner and Katy likes to sweep (11).... floor. Dad gives John and Katy money when they help him. They usually spend the money on (12).... computer games! can i have an analysis of poem repair by finuala dowling 1. Write an expression in simplest form for the area of the figure below:(answer pls) Entry for Uncollectible Accounts Outlaw Bike Co. is a wholesaler of motorcycle supplies. An aging of the company's accounts receivable on December 31 and a historical analysis of the percentage of uncollectible accounts in each age category are given below. Estimated Uncollectible Estimated Uncollectible Age Interval Balance Accounts Percent Accounts Amount Not past due $780,000 1/2% $3,900 1-30 days past due 85,800 2 1,716 31-60 days past due 39,000 9 3,510 61-90 days past due 28,100 16 4,496 91-180 days past due 20,300 41 8,323 Over 180 days past due 14,800 65 9,620 Total $968,000 $31,565 Assume that the allowance for doubtful accounts for Outlaw Bike Co. had a debit balance of $5,680 as of December 31. Journalize the adjusting entry for uncollectible accounts as of December 31. i dont know how to solve this find xplease help!!