1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
2 years ago
7

1.- Make a program that loops and perform powers of 5 on each loop.

Computers and Technology
1 answer:
Olin [163]2 years ago
6 0

A program that loops and performs powers of 5 on each loop.In each lap the operator is asked IN CODE C++ the C++ Program for the given hassle announcement is as follows:#include the use of namespace std.

<h3>What is the energy of a variety of?</h3>

The energy of a variety of says how usually to apply the range in a multiplication. Powers also are known as Exponents or Indices. For example, eight^2 might be known as “eight to the energy 2” or “eight to the second one energy”, or simply “eight square.

  1. C++ Program for the given hassle announcement is as follows:
  2. #include
  3. the use of namespace std;
  4. int main() > base;
  5. cout << "nEnter the exponent: ";     //asks the user for keyboard input for exponent
  6. cin>>exponent;
  7.  for (int i = 1; i <=exponent; i++)    //iterate {through|thru|via">via 1 until exponent
  8. {
  9.       num=num*base;
  10. //base is multiplied (e.g. 2*2*2.....n) until n, wherein n is exponent
  11.    }
  12. cout <<"n"<strength of "<go back 0;
  13. }
  14. Sample Output:
  15. Stdin Inputs

Read more about the loops :

brainly.com/question/26497128

#SPJ1

You might be interested in
How are general-purpose reg
Marina CMI [18]

Answer and Explanation:

The general purpose register are  used for storing the temporary data within the microprocessor there are many general purpose register but 4 are mostly used which are AX,BX,CX,DX  AX is refereed as accumulator and most of the operation are preferred in AX. in 8086 microprocessor there are 8 general purpose register

4 0
3 years ago
The act of deliberately accessing computer systems and networks without authorization is generally known as _____.
Anuta_ua [19.1K]

it is known as hacking

3 0
3 years ago
Which type of data is shown below?<br> apple, 0.85<br> banana, 0.90<br> peach, 1.50
d1i1m1o1n [39]

Answer:

dictionary data

Explanation:

data = {"apple" : 0.85, "banana" : 0.90, "peach": 1.50}

4 0
3 years ago
Where would you plot full employment on a production possibilities frontier?
True [87]

Answer:

I think it would be C.

Explanation:

7 0
2 years ago
The root operation(s) that means ""taking out or off a device from a body region and putting back an identical or similar device
denpristay [2]

Answer:

Change-Root Operation

Explanation:

Change is defined as taking out or off a device from a body part and putting back an identical or similar device in or on the same body part without cutting or puncturing the skin or a mucous membrane. All change procedures are coded using the external approach.

The change root operation reflects only those procedures where a similar device is exchanged without making a new incision or puncture. In the change root operation, general body part values are used when the specific body part value is not in the table.

6 0
3 years ago
Other questions:
  • A 5.5 g sample of a substance contains only carbon and oxygen. Carbon makes up 35% of the mass of the substance. The rest is mad
    8·1 answer
  • You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following wil
    13·1 answer
  • The background image does not affect any cell’s format or content. _______
    5·1 answer
  • In an IPv.4 addressing scheme the router works at layer 3 on which addressing layer?
    14·1 answer
  • Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit
    7·1 answer
  • Programs are normally stored in ________ and loaded into main memory as needed. the input device the output device secondary sto
    15·1 answer
  • What is one pass of a coding sequence called?​
    13·2 answers
  • What is information technology?
    9·1 answer
  • What is the output of the following program?
    8·1 answer
  • South Africa is the main supplier of which minerals in the world​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!