Write structured pseudocode to show the following: when you are on time for work you have time to buy coffee

Answers

Answer 1
Answer:

Answer:

If( on_time == True) {

     print("Coffee")

} else {

    print("No Coffee")

}

Explanation:

Step 1 evaluate with a boolean variable if you are on time

If( on_time == True) {

Step 2 if true you have coffee

print("Coffee")

Step 3 if false you have not coffee

print("No Coffee")


Related Questions

All of the following are strengths of the Internet as a source of information except
The two ways to use the help menu is by searching of the contents or searching the _____ Menu Index File Catalog
Given the acquisition environment and circumstances described in the BSVD Program documents, do you recommend contracting without providing for full and open competition for the BSVD bio-sensor contract? Preface your response with either of the following: "Yes, we recommend contracting without providing for full and open competition" or "No, we do not recommend contracting without providing for full and open competition." Note: References to the specific FAR exceptions to full and open competition are not necessary, as these will be addressed in question 2(b). Focus your response on the facts presented in the case and what you find appropriate in relation to conducting full and open competition or limiting competition. Provide at least three facts from the case that support your rationale and explain how these facts lead to your conclusion.
What type of malicious software masquerades as legitimate software to entice the user to run it?
Which technology is suitable to cover the whole city for internet?​

Challenge: Tic-Tac-Toe (Report a problem) Detecting mouse clicks For this step of the challenge you will complete Tile's handleMouseClick method. The handleMouseClick method has two parameters: x and y which represent the coordinates of where the user clicked the mouse. When a user clicks inside a tile, that tile's handleMouseClick method should call that tile's onClick method. To check if the mouse click is inside of the tile, you will need an if statement that checks if: - the mouse click is on, or right of, the left edge of the tile - the mouse click is on, or left of, the right edge of the tile - the mouse click is on, or below, the upper edge of the tile - the mouse click is on, or above, the lower edge of the tile

Answers

Answer:

var playerTurn;

var NUM_COLS;

var NUM_ROWS;

var SYMBOLS;

var tiles = [];

var checkWin = function()

{    };

var Tile = function(x, y)

{

 this.x = x;

 this.y = y;

 this.size = width/NUM_COLS;

 this.label = "";

};

Tile.prototype.draw = function()

{

   fill(214, 247, 202);

   strokeWeight(2);

   rect(this.x, this.y, this.size, this.size, 10);

   textSize(100);

   textAlign(CENTER, CENTER);

   fill(0, 0, 0);

   text(this.label, this.x+this.size/2, this.y+this.size/2);

};

Tile.prototype.empty = function()

{

   return this.label === "";

};

Tile.prototype.onClick = function()

{

   // If the tile is not empty, exit the function

   // Put the player's symbol on the tile

   // Change the turn

};

Tile.prototype.handleMouseClick = function(x, y)

{

   // Check for mouse clicks inside the tile

};

for (var i = 0; i < NUM_COLS; i++)

{

   for (var j = 0; j < NUM_ROWS; j++)

  {

       tiles.push(new Tile(i * (width/NUM_COLS-1), j * (height/NUM_ROWS-1)));

   }

}

var drawTiles = function()

{

   for (var i in tiles)

  {

       tiles[i].draw();

   }

};

mouseReleased = function()

  {

   for (var i in tiles)

       {

       tiles[i].handleMouseClick(mouseX, mouseY);

       }

 };

draw = function()

{

   background(143, 143, 143);

   drawTiles();

};

Explanation:

Is there a point where preto distribution really takes over?

Answers

Answer:

Yes Preto distribution takes over when we apply 80/20 rule.

Explanation:

The Pareto distribution is derived from pareto principle which is based on 80/20 rule. This is main idea behind the Pareto distribution that  percent of wealth is owned by 20% of population. This 80/20 rule is gaining significance in business world. There it becomes easy to understand the input and output ratio. The input ratio helps to analyse the potential output using Pareto distribution.

Andre is finding working in an online group challenging because there are people in the group from many different cultural backgrounds. Which are the three major areas that present challenges to students in such situations?​

Answers

Answer:

When working in multicultural groups, students may find challenges in the areas of language barriers, social behavior expectations, and communication style differences.

Explanation:

Answer:

Different Communication Styles

Different Attitudes Toward Conflict

Different Approaches to Completing Tasks

Different Decision-Making Styles

Different Attitudes Toward Disclosure

Different Approaches to Knowing

Explanation:

Some operating systems have a tree–structured file system but limit the depth of the tree to some small number of levels. What effect does this limit have on users? How does this simplify file system design (if it does)?

Answers

Answer:

See attached pictures.

Explanation:

Jason needs to design the colors for a web site that make it easy to read. Which should he consider using?O Contrasting background and text
Dark background and dark text
Dark background and light text
Similar background and text​

Answers

Answer: Dark background and light text.

Explanation:

Assuming when you mean by "light text", you mean by white text. This should be able to be readable by users visiting the site.

Answer:

Contrasting background and text

Explanation:

When selecting a color scheme for a website, designers often choose complementary colors that keep the visitor on the website.

Your web page should have three main colors: one for the background, one for the text, and one for the headings. The colors you select should complement each other and be on opposite sides of the color wheel.

Also i got it right on my test!

Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers like Wireshark and capturing packets c. using rootkits and privilege escalation to get to the kernel processes d. using a virus and destroying the computer that stores authentication information.

Answers

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.