qbasic program to check whether the given number is odd or even​

Answers

Answer 1

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

Answer 2

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END


Related Questions

coding word scramble

ICOAIPAPLTSN- a software program for end users

AADT- processed information

RAAEHWRD- physical parts of computer system

MRNPAGOGIMR- instruction given to the computer
plz answer as soon as possible

Answers

application, data, hardware, programming

The decoded words for the coding word are:

ICOAIPAPLTSN - ApplicationAADT - DataRAAEHWRD - HardwareMRNPAGOGIMR - Programming

What is coding words?

In the above decoded words, "ICOAIPAPLTSN" unscrambles to "Application." An application, often referred to as software or a program, is a set of instructions designed to perform specific tasks or functions for end users. Applications can be anything from productivity tools, games, communication software, and more.

Also, "AADT" unscrambles to "Data." Data refers to any piece of information or raw facts that are collected, stored, and processed by a computer system. Data can be in various forms, such as text, numbers, images, videos, and more.

Read more about coding here:

https://brainly.com/question/26134656

#SPJ3

what are the parts of a file?​

Answers

Answer:

A computer file is made up of three elements: characters, fields and records.

Explanation:

Hope this helps! :D

write code that removes the first and last elements from a list stored in a variable named my_list. assume that the list has been initialized and contains at least two elements.

Answers

Answer:

[24, 35, 9, 56 Approach #3: Swap the first and last element is using tuple variable.

What component uses thermal paste to attach the heat sink?

Answers

Answer:

Thermal compound is the answer

Why is the Game Design Document called a ""living"" document AND why is this important?

Answers

Answer:

documentation

Explanation:

Because it gives the instructions rules and every detail about the game with anything in the real world with computers documentation is extremly important  

How do people decide their ethical behavior

Answers

Explanation:

Ethical behavior is based on written and unwritten codes of principles and values held in society. Ethics reflect beliefs about what is right, what is wrong, what is just, what is unjust, what is good, and what is bad in terms of human behavior.

Answer:

most people go by the crowd to the way they act. theres are also people who have to make very hard decisions and not everyone makes the right choice.

Explanation:

Dữ liệu trong 1CSDL được lưu trong

Answers

Answer:

ha ano daww??

Explanation:

??? btw thanks for the points

Complete the sentence.
A(n)
A. Accessibility document
B. User manual
C. Code library
D. Version control document keeps track of the version numbers of an app and what changes were made váth each
version

Answers

Answer: D Version control document

Explanation: right on cs

A version control document keeps track of the version numbers of an application and what changes were made in each version.

What is version control?

Version control can be defined as a process through which changes to a document, file, application and software codes over time, are tracked, recorded and managed, especially for easy recall and modification of specific versions in the future.

In Computer technology, an example of a version control system that is commonly used by software developers across the world is Git.

Read more on version control here: https://brainly.com/question/22938019

#SPJ2

what is the answer ??​

Answers

Answer:

D all of the above

B operating system

the person above ^ me is correct

2
2. When designing a kitchen to be handicapped acces-
sible, toe space of deep and 8" to 11" high is
needed under the cabinets for wheelchair footrests.

Answers

Answer:

ok.... ..............

Look around at your current surroundings. What type of light is present? If someone were to take a photo of you from the front, what type of lighting would be present in the image? Evaluate and describe the type of lighting in your present surroundings and the various types of lighting that would be present if someone were to take your photo right now.

Answers

Answer:

White light

Explanation:

The lights are white in the classroom

Answer: Personally, I have many lights throughout my bedroom, but the main focus being the one in the center, up top. This light brings a yellowish tone throughout the room and is very bright. My window is blocked off from a blackout curtain, so there is no natural light. And, my LED lights spread throughout the top of my room, bringing a red tone to the left side, but not nearly as present as my center lighting.

Explanation: kinda specific answer i submitted

algorithm to convert Fahrenheit temperature into celsius temperature​

Answers

Lets use python

[tex]\\ \tt F=(float(input("Enter\:temperature\:in\:Fahrenheit:")))[/tex]

[tex]\tt C=(F-32)*5/9[/tex]

[tex]\tt print("Temperature\:in\:Celsius\:is",C°C)[/tex]

Output:-

[tex]\tt Enter\:temperature\;in\:Fahrenheit:32[/tex]

[tex]\tt Temperature\:in\:Celsius\:is\:0°C[/tex]

Answer:

Using c++ variable names

double c;

double f;

//set f to some temperature value or pass the value to the function

c=f-32;

c=f*(5/9);

//c is now the temp in celcius

The rolling movement of the mouse causes a corresponding movement of the ___________ or ______________ on the screen​

Answers

Answer:

cursor or pointer

Explanation:

beacause the main js crom the algorithm

what is the best protection method for sharing pii

Answers

Answer:

What is the best protection method for sharing (PII)? Digitally sign and encrypt the email..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

30 points!!! Due Tomorrow. ICT test on memory, CPU, motherboard and dedicated/embedded systems and general purpose systems. Any tips?​

Answers

Answer:

Just get it right and don't get stressed

Explanation:

An embedded system is a computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system.[1][2] It is embedded as part of a complete device often including electrical or electronic hardware and mechanical parts. Because an embedded system typically controls physical operations of the machine that it is embedded within, it often has real-time computing constraints. Embedded systems control many devices in common use today.[3] In 2009 it was estimated that ninety-eight percent of all microprocessors manufactured were used in embedded systems.[4]

Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?

Answers

Answer:

HIPAA

Explanation:

The Health Insurance Portability and Accountability Act of 1996 is a United States federal statute enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996.

how many times should the start function be defined in a program?

Answers

Answer:

0 1 2 However many you like

✓ I think its 2x they will start to define the program

fields where computers are used include: business, education, banking, government, true or false​

Answers

Answer:

True. Most businesses use computers, including all 4 mentioned in your questions.

You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications are installed on the C: volume on the first hard disk. Because of the size of the audio files you produce, you keep them on a separate volume (D:) located on the second hard disk. Your Windows desktop system has system protection enabled on the both drives. You need to configure system protection on this system to maximize overall protection. What should you do

Answers

Answer:

You can go to the windows group policy settings and turn the security mode to thw highest or just installing a AV system that has a good reputation.

Hope this help please give the brainliest award would be much appreciated.

Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?

Answers

Answer:

Left-click each message, and move it to the Trash folder.

Right-click the Deleted Items folder, and click Empty Folder.

Click the Folder tab, and click the Empty Folder in Clean Up group.

Right-click the Deleted Items folder, and click Mark All as Read.

What is the maximum number of guesses it will take to find a number
between 1 and 64?

Answers

Answer:

10?

Explanation:

whenever I try to make an account it says it can't sign me up at this time or something- can you help?-

Answers

Answer:

You can try emailing tech support and describing your issue. In order to get the best help as quickly as possible, try providing screenshots of what happens when you sign in or describe everything you see on the screen when the problem occurs, and quote error messages directly when possible.

a modem is required for ________________ internet access.

Answers

Broadband I believe!

a researcher is interested in assessing risk-taking

Answers

Answer:

Risk-taking is a dangerous behavior

Explanation:

Knowing this he /she should take the proper safety measures

what is the version number for mysql returned from port 3306

Answers

Answer:

For MySQL, the default port is 3306, which means if you have installed MySQL externally, it will listen to the 3306 port. But when it gets installed with the WAMP package, it is now 3308 in a new version of WAMP because, from the latest version of the WAMP server (3.2.

Can someone help me please?

Answers

Answer:

ummm this is hard i think answer is 5 robuk am pro

Explanation:

cuz me say soo

Please answer this thank you

As a good housekeeper, list down at least 5 ideal traits and why you should practice them in terms of housekeeping​

Answers

Cooking, for good food
Cleaning, a clean house

You have a Windows system that has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is used for public connections. You need to allow help desk users to use Remote Assistance to help you while working on the wired network, but you want to block any such access from the wireless network. How can you configure Windows Firewall to allow and deny access as described

Answers

Answer: D. Enable the remote Assistance exception only on the private profile

Explanation:

!!HELP!!
I need to know what the code is!!

Answers

What is the webpage link then click ctrl i that will show source code I am not for shure if this helps if not let me know

PLEASE HELP PLEAAASSSSSEEEE!


When search engines republish content, it refers to _____.


a leaking data exhaust

an active data exhaust


an active digital footprint


a passive digital footprint

Answers

Answer:

a passive digital footprint

Explanation:

When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.

Answer:

D. a passive digital footprint.

Explanation: got it right

Other Questions
Luigi incorrectly solved the following equation. Explain the error in Luigi's work.Complete your work in the space provided or upload an image of your work completed on paper. List 2 positive impacts of cybersecurity. **Answer and I will give you brainiliest** How are researchers working to read animals emotions Tom is deciding whether or not he should become a member gym to use their basketball courts. The membership cost is $135. Members pay $2 to rent out the basketball courts. Non-members can rent the court also, but they have to pay $11 each time. how many times would Tom need to rent the court in order for it be cheaper to be a member than a non member? Which of the following is NOT a correct ordering of subshells in the periodic table?O 2p < 35O 3d < 4pO 3d < 4504s < 4p I need help.It measures 10 cm x 5 cm x 2 cm and has mass of 1,930g. What is the density of the gold bar? Read the quotation from Booker T. Washington's 1895 Atlanta Compromise Speech.In all things that are purely social we can be as separate as the fingers, yet one as the hand in all things essential to mutual progress.Which statement best describes the view Washington is expressing in this quotation?Segregation creates anger, resulting in damage to society that can never be repaired.In order to achieve social progress, people of different races must leave each other alone and develop independently.Maintaining an individual and racial identity does not mean all people cannot work together.In order to achieve social progress, people of different races must work together in every way. What legal concept gives the Supreme Court power to influence and mold the everyday operating procedures of the police, trial courts, and corrections agencies?1.) Pro bono2.) Implicit bias3.) Mediation4.) Precedent what is the character development in "the necklace" A number less 5 divided by 42 Giving brainliest too correct answer Which of the following reflects perceived weaknesses in the current two-party system? Neither party will take a firm stance on issues because of the large number of voters they attract. Candidates do not reflect general public. Parties only appeal to specific groups. all of the above A laptop has a listed price of $503.98 before tax if the sales tax rate is 7.5% find the total cost of the laptop with sales tax included 2. Describe the difference between:(a) a group and a period COMO CREES QUE SE PODRIA SOLUCIONAR LA POBREZA ) SI NO SABEN NO CONTESTEN :( EL QUE ME AYUDE LE DOY CORONA POR FA VOR Qu significa el adverbio en esta oracin?Siempre sacas buenas notas. - List 5 community events that Germany has in the year 1920/1930s. Please help me please 3. What surprise was waiting Aeneas and his crew around the southern part of Sicily?4. How did they escape the monster?5. Who sent the storm against the Trojans?6. Why was the storm sent? Find 4 unusual fruits and four unusual vegetables. State their names, describe what they look and taste like, and explain how to prepare them for mise en place. Suggest uses for each of these fruits and vegetables. find the total surface area of this cylinder height=18 diameter=24