1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
daser333 [38]
2 years ago
7

"Write code that prints: Ready! countNum ... 2 1 Start! Your code should contain a for loop. Print a newline after each number a

nd after each line of text Ex: countNum = 3 outputs: Ready! 3 2 1 Start!"
Computers and Technology
1 answer:
BartSMP [9]2 years ago
6 0

Explanation:

#include <iostream.h>

#inlcude<conion.h>

void main()

{

  int count, x;

  clrscr();

  cout<<"Enter the count:";

  cin>> count;

  cout<<"Ready!\n";

  for(x=count;x>0;x--)

  {

     cout<<x<<"\n";

  }

  cout<<"Start";

  getche();

}

This is a simple program where the output is expected to be in reverse order. So we run a for loop starting from the count and decrements the counter by 1 every time when the loop runs and print the value. So to print the output in "new line" we include "\n".

You might be interested in
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone w
Setler79 [48]

The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.

<h3>What is the network about?</h3>

Broad network access is known to be a feature of cloud computing as it is seen as  the ability of network tools to be able to link with a large scope or variety of devices.

Note that The cloud technology characteristic that ensures that a cloud customer can make changes to her cloud database from her smartphone is Broad network access.

Learn more about cloud technology from

brainly.com/question/19057393

#SPJ1

5 0
2 years ago
____ is any technology that aids in gathering information about a person or organization without their knowledge.
DanielleElmas [232]

Answer:

Spyware

Explanation:

In most cases, a spywares are unwanted software enters into your computer or other devices and steal sensitive information, your internet usage data, and other information. Spyware is considered a malware type and a malicious one that is aimed at damaging a device or gaining control and access without the knowledge of the owner.

4 0
3 years ago
Does anyone play genshin impact here?
Reika [66]
Answer


NO sorry
Have a great day
6 0
3 years ago
Read 2 more answers
Which item converts a high level language program to low level machine instruction?
vodomira [7]
The compiler translates each source code instruction into the appropriate machine language instruction, an
8 0
3 years ago
A type of employment test that is used to determine if personal and behavior preferences match the position.
aleksandrvk [35]

Explanation:

correct answer is D

Background check

8 0
2 years ago
Other questions:
  • rob just got a new idea for the movie he's making, and he wants to put in late hours to get it done. Which of the following stat
    10·1 answer
  • Upon looking out at the
    8·2 answers
  • What do developers do to support software products
    14·1 answer
  • Select the tips you should follow when writing a business report.
    12·1 answer
  • The first known permanent photograph was called "View from the Window at Le Gras." True False
    9·1 answer
  • What is the location used by users to configure delegate access on their own mailboxes? Backstage view &gt; Account Settings Bac
    12·1 answer
  • How should work be allocated to the team in a Scrum project?
    13·1 answer
  • Compress<br> 00eb:0000:0000:0000:d8c1:0946:0272:879<br> IPV6 Address
    9·1 answer
  • How do you convert an algorithm to make it possible for a computer to read
    6·1 answer
  • Scientist Galileo Galilei used the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!