1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
14

Write a loop statement to count and display the number of positive integers in the array. That is, your loop should display the

message "Number of positive integers is 5". int myArray[] = { -1, 3, -9, 9, 33, -4, -5, 100, 4, -23};
Computers and Technology
1 answer:
dlinn [17]3 years ago
3 0

Answer:

int count =0;

    for(int i=0;i<10;i++)

    {

        if(myArray[i]>=0)

        {

            count++;

        }

    }

    cout<<"Number of positive integers is "<<count<<endl;

Explanation:

The above written loop is for counting positive integers in the myArray[].

For counting we have taken a count integer initialized with 0.On iterating over the array if the element is greater than or equal to 0 we consider it as positive and increasing the count.At the end printing the count.

You might be interested in
Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
timurjin [86]

Answer:

Find answers below.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.

Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.

In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

6 0
3 years ago
Savings accounts usually offer _________ interest rates than checking accounts. It is _________ to access your money in a saving
UkoKoshka [18]
<span>Checking account is another name for the current account. Checking account offers lower interest rate and it is easy to access you money in the checking account as compared to a savings account.
Thus, the answer is HIGHER and HARDER.</span>
8 0
4 years ago
Read 2 more answers
What is a client server network and its features?​
maks197457 [2]

Answer:

A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.

8 0
3 years ago
David is selling his art work. He wants to figure out how much he should charge for each painting to make a 20 percent profit. H
VMariaS [17]

Answer:

create a spreadsheet that totals the cost and calculates 120 percent of the total cost

8 0
3 years ago
Which was the first computer brought in nepal?<br>​
Natasha_Volkova [10]

Answer:

the first conputer brought in nepal was IBM 1401

3 0
3 years ago
Read 2 more answers
Other questions:
  • An electronic resume is a plain-looking document. True of False?
    6·2 answers
  • The time between requests to a web server is exponentially distributed with mean 0.5 seconds. NOTE: This is a multi-part questio
    8·2 answers
  • Local television news networks cover only
    8·2 answers
  • Question 14. 14. PowerPoint assumes every new slide, except for a blank slide, has _____.
    13·1 answer
  • Modify the NumberedList class we implementd during the lecture by adding a member function: void NumberedList::insertPosition(in
    13·1 answer
  • A celebrity blogger you have followed for years advises readers to try a new beauty product. Before purchasing the product, a sa
    10·1 answer
  • 111+ 11- 1 <br><br><br>1111+1111<br><br><br><br><br>1101 +1101<br><br><br>1010-11​
    10·2 answers
  • Spark is electrical discharge in air, while air is mix of variety of gases what particles conduct electricity in gas
    12·1 answer
  • Mention two cables that connect the monitor to the system unit​
    9·1 answer
  • Significant design efforts, during deliberate planning at combatant commands, produce results as those commands _____. (Select a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!