1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
masha68 [24]
4 years ago
9

If the input is negative, make numItemsPointer be null. Otherwise, make numItemsPointer point to numItems and multiply the value

to which numItemsPointer points by 10. Ex: If the user enters 99, the output should be:
Computers and Technology
1 answer:
Brilliant_brown [7]4 years ago
6 0

Answer:

The code for the given statements are described below.

Explanation:

// Place code below in line 9

if(numItems < 0)  // starting of a loop

{

numItemsPointer = NULL;

}

else  

{

numItemsPointer = &numItems;

numItems = numItems * 10;   // items multiplied by 10

}   // ending of a loop

You might be interested in
Survey Q. Non-scoring: What role is played in the team? (1 correct answer)
Maurinko [17]
I really don’t kno the answer to this question sorry
4 0
3 years ago
An IT professional with a customer-service
oksian1 [2.3K]

Answer: work late to make sure a persons issue is resolved

Explanation:

I just took the test

6 0
4 years ago
____________ is a widely accepted international best practices framework for implementing information systems security.
balandron [24]

Answer:

Control Objectives for Information and related Technology (COBIT)

Explanation:

COBIT is a framework developed by the ISACA for managing and supervising Information Technology processes. Such kinds of frameworks allow companies to position themselves with the expectations that they and their clients expect. COBIT's aim is to provide management and business process owners with an IT control and governance model that helps deliver value from IT and identify and handle the IT-related risks. It helps bridge the gap between business needs, control requirements and technical issues. It is a paradigm of control for addressing the IT governance requirements and maintaining the security of knowledge and information systems. COBIT emphasizes on what allows processes to work well.

8 0
4 years ago
3. with a dui charge on a driver’s record ______________. a. the price of his or her insurance greatly increases b. he or she ma
djyliett [7]
<span>The answer to your question is D. both A and C</span>
7 0
4 years ago
In a bluesnooping attack, the attacker copies emails, calendars, contact lists, cell phone pictures, or videos by connecting to
Kay [80]
The answer is depends. You can only get what the port lets you get. If the phone bans sending photos over Bluetooth than you can’t get the photos
3 0
3 years ago
Other questions:
  • Dan needs to ensure that delegates as well as those looking at his shared calendar information are unable to see the details of
    7·1 answer
  • Don is the superintendent of the county school system. What task might Don
    8·1 answer
  • What cable should i be using to connect my android tablet to the pc?
    13·2 answers
  • How did the movie characterized being a genius on real genius movie
    13·2 answers
  • Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. I
    12·1 answer
  • Edhesive 4.1 question 1
    9·1 answer
  • ________ development is the term used to describe an information system development methodology that emphasizes flexibility and
    11·1 answer
  • Who the heII is apsiganocj
    14·2 answers
  • What could have made you redesign your plan? Select 3 options.
    6·1 answer
  • Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!