1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali5045456 [20]
3 years ago
10

Algorithm to print the first 10 odd numbers​

Computers and Technology
1 answer:
77julia77 [94]3 years ago
4 0

Answer:

I have the code written in c++ but the logic will be the same you just have to change the syntax ( if you're writing different language)

Explanation:

please mark brainliest

You might be interested in
Jordan just wrote a secret message program in python that converts the number 7,095 to 1s and 0s. Which number system is Jordan
nevsk [136]

Answer:

Binary

Explanation:

Binary code is code that only entails 1s and 0s

7 0
3 years ago
Read 2 more answers
In which type of referencing do you get a warning message? Explain why.​
Art [367]

Answer:

These are the problems that are not severe enough to prevent processing. They mainly complain about the previous version of your document. In the case of command invalid, the latex gives a warning and henceforth it needs to be fixed.

Explanation:

There are some bugs in which they are not that severe that make the system not process.. but they are still mistakes in which might affect how the program run those parts.. like in JavaScript in the program i use, the minor bugs are like symbolized as yellow triangle and they are normally like signalizing a grammar error in the code and the app still runs but just that part of the code is invalid or reads wrong.. while big errors like codes that dont make sense, those make a red squareish that as soon as you try to run the program the debug console states in all red "Line 50(or whatever line) SyntaxError" or other things

5 0
3 years ago
Memory is a _____________ that includes the organization and shaping of information by processing, storage, and retrieval of inf
vaieri [72.5K]

Answer:

A. <em>Encoding Process </em>

Explanation:

Memory is an <em>encoding process </em>that includes the organization and shaping of information by processing, storage, and retrieval of information.

There are two types of memory in computing, <em>RAM </em>and <em>ROM</em>. <em>RAM </em>stands for <em>Random Access Memory</em>. It I the core memory of the computer and it is especially faster regarding reading and writing process. As an analogy, RAM memory is like the “<em>Short-term</em>” memory of the computer. <em>ROM </em>stands for <em>Read-Only Memory</em>, this is the type of memory in charge of permanently storing data in the computer. It contains the necessary information to run the computer. As an analogy, <em>ROM </em>memory is like the “<em>long-term</em>” memory of the computer.

3 0
3 years ago
Let’s define a new language called dog-ish. A word is in the lan- guage dog-ish if the word contains the letters ’d’, ’o’, ’g’ a
Alenkasestr [34]

//docommentifanyproblemarises //code classMain{ publicstaticvoidmain(String[]args){ /* * *leavethismain  would be some of the code. i hope this helps.

7 0
4 years ago
This is going to get taken down but I dont care add me on discord cause ima bored<br> -Red-#9847
Alex777 [14]

Answer:

I WILL

Explanation:

6 0
3 years ago
Other questions:
  • Which connector is most commonly used to connect printers to desktop pc systems?
    10·1 answer
  • How to set up a paper format in any type of Microsoft version ????
    11·1 answer
  • Jeremy is designing a website for a local pizza place. What is the appropriate resolution for him to set his images to?
    5·1 answer
  • You have just used a command that produced some interesting output on the screen. You would like to save that information into a
    10·1 answer
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • The "offset" between the viewfinder and the lens in compact cameras results in a problem called
    6·1 answer
  • When using IPsec, how can you ensure that each computer uses its own private key pair?
    12·1 answer
  • What is the purpose of the Split command?
    10·2 answers
  • The Mifflin Cable store in Buffalo is currently offering a fabulous marketing strategy for potential new cable and Internet cust
    12·1 answer
  • Q5: what is the difference between a spreadsheet and a relational database? when would you have to use a relational database ins
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!