1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
4 years ago
9

Write a program that prompts the user to input two numbers—a numerator and a divisor. Your program should then divide the numera

tor by the divisor
Computers and Technology
1 answer:
icang [17]4 years ago
4 0

Answer:

#include <stdio.h>// inclusion of header file.

int main()// definition of main function.

{

  int Quotient,divisor; // declare the two numbers for operation.

  scanf("%d %d",&Quotient,&divisor); // take the user inputs by scanf() function.

  printf("The division result of the number = %f",Quotient/divisor);

// print statement to print the division.

   return 0; // return statement.

}

Output:

  • If the user input is 10 and 9 then the output is 1.
  • If the user input is 4 and 2 then the output is 2.

Explanation:

  • Firstly there is a file inclusion which helps to understand the input and output function
  • Then we declare two variables of integer type which take a value of integer type.
  • Then there is a scanf statement which takes the input from the user. The '%d' format specifies that the value is in an integer value.
  • Then there is a print statement that gives the divisor in floating value. The division operation is written in the printf statement which is used to print the value. '%f' display the value in decimal value.
You might be interested in
What is a computer memory <br>​
Alex_Xolod [135]

Answer:

In computing, memory is a device or system that is used to store information for immediate use in a computer or related computer hardware and digital electronic devices. The term memory is often synonymous with the term primary storage or main memory. An archaic synonym for memory is store.

5 0
3 years ago
Read 2 more answers
Which statement best describes a scientific theory?
lisov135 [29]

Answer:

It is supported by many different experiments.

Explanation:

Scientific theory is based on different experiments and tested in different situations and environment will all aspects. If the experiment finds true then observations will become theory. It can be changed in future if it does not meet the newly proposed conditions. But It does not means that, every theory can be changed.

6 0
3 years ago
A structure is private by default, but can be declared to be friend or private.
posledela
Structures can be accessed from anywhere within the module or class in which they are declared. A structure is Friend by default. To specify the accessibility in more detail, include Public, Protected, Friend, Protected Friend, or Private in the Structure statement. You must declare every data member of a structure.
4 0
3 years ago
I NEED TO FIND OUT THE ANSWER!
vladimir1956 [14]

Answer:

the first action that should be taken is to back up the all important document that and by finishing doing that format the entire system...and i advise you should be choosing the best antivirus to protecting your computer

7 0
3 years ago
Unix has experimented with several security programs. a user can attach a watchdog program to a file that grants or denies acces
Cloud [144]

Watchdog Program

This program becomes the number one security mechanism for file access.

Pros:

  1. A benefit of using watchdog program is that you have a centralized mechanism for controlling access to a file
  2. You are assured of having secure access to your file

Cons:

  1. It becomes a bottleneck.
  2. If this program has a security hole, there are no other guaranteed backup mechanisms for file protection.

COPS

COPS is a collection of a dozen programs that attempt to tackle problems in UNIX security. It checks for a number things like poor passwords, device permissions, files run in /etc/rc*, existence of root SUID, and many other things.

Pros:

  1. This program provides methods of checking for common procedural errors.
  2. COPS collect outputs and either mails the information to the admin or logs it in.

Cons:

  1. It could be modified by an intruder or even take advantage of its features.
  2. It is meant to tighten the security, not a tool to be used to find security flaws. It does not directly correct errors found.

5 0
4 years ago
Other questions:
  • Write a note on secondary storage​
    14·1 answer
  • What is the purpose of copyfitting?
    12·1 answer
  • What do you need to know when buying screws<br>​
    12·2 answers
  • Select the true statement about HTML. HTML is a language that is used to create Web pages. HTML tags tell a web browser when to
    7·2 answers
  • List safety conditions when downloading shareware, free free where, or public domain software
    14·1 answer
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • Complete the code to convert a float to a string. <br> answer=5.3 <br> strAnswer=__ (answer)
    12·2 answers
  • PLEASE HELP!! I just joined this school and it was a online day but I didn’t have time to study because I’m new please help me i
    5·1 answer
  • What is the result when you run the following program?
    9·2 answers
  • What are the methods of gilding<br><br>nonsense will be immediately reported. ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!