1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
6

Write a while statement that prints all even numbers between 1 and 100 to the screen.

Computers and Technology
1 answer:
Marrrta [24]3 years ago
8 0

Answer:

Following are the while loop in c language.

while(i<100)

   {

if(i%2==0)

{

printf("%d",i);

printf("\n");

}

++i;

 }

Explanation:

Following are the code in c language.

#include<stdio.h> // header file

int main() // main function

{

   int i=1; // variable declaration

   while(i<100) // check the condition between 1 to 100

   {

if(i%2==0) // check that number % 2 ==0

{

printf("%d,",i); // print the number

}

++i;

 }

   return 0;

}

Output:

2,4,6,8,10,12,14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48,50,52,54,56,58,60,62,64,66,68,70,72,74,76,78,80,82,84,86,88,90,92,94,96,98,

 

You might be interested in
Un usuario desea conocer de manera descriptiva ,como se lleva a cabo el proceso de solicitud de transferencia monetaria en una p
Rus_ich [418]

Answer:

Research My Friend Use a Translator Promise!!

6 0
3 years ago
Read 2 more answers
describe how sodium ammonium chloride can be separated from a solid mixture of ammonium chloride and anhydrous calcium chloride​
kirill115 [55]

Answer:

There are way in separating mixtures of chlorides salts such as that of sodium chloride and ammonium chloride. It can be done by crystallization, filtration or sublimation. If we want to separate the mixture, we have to heat up to 330-350 degrees Celsius and collect the gas that will be produced.

5 0
3 years ago
What is a symbol such as a heavy dot or another character that precedes a text in a power point
Fantom [35]

Answer:

<em>I </em><em>think </em><em>the </em><em>answer </em><em>is </em><em>a </em><em>bullet.</em>

<em>Hope </em><em>this </em><em>helps</em>

4 0
1 year ago
Assume that to_the_power_of is a function that expects two integer parameters and returns the value of the first parameter raise
Bezzdna [24]

Answer:

The statement in python is as follows:

to_the_power_of(cube_side,3)

Explanation:

As stated as the requirement of the code segment, the statement takes as parameters a variable cube_side and a constant 3.

It then returns the volume of the cube; i.e. cube raise to power 3

<em></em>

<em>See full program below</em>

<em>def to_the_power_of(val,powe):</em>

<em>     result = val**powe</em>

<em>     print(result)</em>

<em>cube_side = float(input("Cube side: "))</em>

<em>to_the_power_of(cube_side,3)</em>

4 0
3 years ago
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demil
ella [17]

Answer:

i. True

Explanation:

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.

PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.

Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.

In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).

A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.

7 0
3 years ago
Other questions:
  • Janeal spends her day looking at the stock and bond markets and evaluating how the portfolios of the businesses she serves will
    5·1 answer
  • How did the discovery of glossopteris support wegner's continental drift hypothesis?
    15·1 answer
  • The java compiler requires that a source file use the ________ filename extension question 3 options: 1) .class 2) .h 3) .java
    8·1 answer
  • A ____ is a type of program that uses a grid to organize and work with data.
    14·1 answer
  • A lack of financial literacy can cause you to lose your
    10·1 answer
  • If you have defined a class named SavingsAccount with a public static data member named numberOfAccounts, and created a SavingsA
    7·1 answer
  • How many sets of number do both Hex and RGB values have?
    10·1 answer
  • Consider this binary search tree:______.
    12·1 answer
  • Which input and output pair is correct for a bicycle?
    12·1 answer
  • The term technology is derived from the Chinese word. it is true or false​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!