1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
2 years ago
8

Write a program that reads three integers as inputs, and outputs the largest of the three values.

Computers and Technology
1 answer:
AlexFokin [52]2 years ago
3 0

The software is written in C++ and may be found in the explanation section below. C++ keywords and symbols are all capitalized. The least number of all three integers is determined via a nested if-else decision branch. After you've entered three integers, the application prints the least of them all.

<h3>What is the example of C++?</h3>

#include <iostream>

using namespace std;

int main() {

  int num1,num2,num3;

  cout<<"enter first integers"<<endl;

 cin>>num1;

  cout<<"enter second integers"<<endl;

  cin>>num2;

 cout<<"enter the third integers"<<endl;

  cin>>num3;

  if(num1<num2){

     if(num1<num3){

          cout<<"Smallest integer is "<<num1<<endl;

    } else{

          cout<<"Smallest integer is "<<num3<<endl;

      }

 }else {

 if(num2<num3){

    cout<<"Smallest integer is "<<num2<<endl;

} else{

    cout<<"Smallest integer is "<<num3<<endl;

     }

}

return 0;

}

Thus, it is written in C++ language.

For more details about C++ click here:

brainly.com/question/19581899

#SPJ1

You might be interested in
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
Which of the following is an example of an application software?
pishuonlain [190]
Word processing software
6 0
3 years ago
What is the use of consonant in QBASIC ? Answer me in short and easy answer.​
Digiron [165]

Answer:

See Explanation

Explanation:

I'll assume the question is about the use of constants in QBasic because consonants do not have any special function or usage in QBasic.

In simple terms: In QBasic, constants are used to represent elements that do not change in value during program execution.

Take for instance, you intend to use \pi in your program.

Its value is \pi = 3.142

So, 3.142 will always be a constant in your program. One of the ways it can be used in a program is:

10 LET PI = 3.142

<em>The above represents a numeric constant. QBasic also have string constants.</em>

3 0
3 years ago
Press ____ to select the entire worksheet.<br> F1<br> F4<br> ALT+A<br> CTRL+A
andreev551 [17]
<span>The answer is CTRL + A, this selects whole worksheet (A means all). In computing, a Control key is a transformer key which, when pushed in combination with one more key, achieves a singular operation (for example, Ctrl + A; like the Shift key, the Control key infrequently achieves any purpose when pushed by itself.</span>
5 0
3 years ago
A __________ infrastructure is made available to the general public or a large industrygroup and is owned by an organization sel
Amiraneli [1.4K]

\Huge{\fbox{\red{Answer:}}}

A <u>public cloud</u> infrastructure is made available to the general public or a large industrygroup and is owned by an organization selling cloud services.

a. community cloud

b. hybrid cloud

c. public cloud ✔

d. private cloud

5 0
3 years ago
Other questions:
  • Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
    12·1 answer
  • manufacturers are making an effort to build energy-efficient computers and use recyclable cases and packaging true or false
    10·1 answer
  • It is safe to interchange oxygen and fuel gas hoses. A. False B. True
    13·2 answers
  • Which property of a text element controls how the browser handles text that does not fit within the element box?
    13·1 answer
  • sparse(compact) Description: A sparse matrix is a 2D matrix that has many zeros. Assume that for storage efficiency someone has
    9·1 answer
  • Which quality allows programmers to modify a program as and when required
    11·2 answers
  • पुजवय<br>शब्दस्य<br>विरूदायक​
    7·1 answer
  • Write the simplest statement that prints the following: 3 2 1 Go! python
    6·1 answer
  • Fill in the Blank
    10·2 answers
  • I WILL MARK BRAINLEST
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!