1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NISA [10]
4 years ago
7

Write a C++ program that uses a while statement and the tab escape sequence \t to print the following table of values:N 1 0*N 1

00*N 1 000*N1 1 0 1 00 1 0002 20 200 20003 30 300 30004 40 400 4000
5 50 500 5000
Computers and Technology
1 answer:
Luda [366]4 years ago
5 0

Answer:

#include <iostream>

using namespace std;

int main()

{

cout << "N\t10*N\t100*N\t1000*N" << endl;

int x=1;

while(x<=5){

 cout << x <<"\t"<< x*10 <<"\t"<<x*100  <<"\t"<< x*1000 << endl;

 x++;

}

   return 0;

}

Explanation:

Print the header, N 10*N 100*N 1000*N, using \t

Initialize the x as 1. It will be used to control the while loop

Create a while loop that iterates while x is smaller than or equal to 5

Inside the loop, print the required values. After printing, increment the value of x by 1

You might be interested in
Which Azure service should you use to correlate events from multiple resources into a centralized repository?
Trava [24]

Answer:

D. Azure Log Analytics

Explanation:

The Azure service we can use when you have to correlate events from more than 1 sources into a repository which is centralized you have to use Azure Log Analytics.

it is a special surrounding for Azure monitor log data.Each workspace has their own repository and configuration.

Hence we conclude that the answer to this question is option D Azure Log Analytics.

6 0
3 years ago
Which is a color group in color theory?
prohojiy [21]

Answer:A color circle, based on red, yellow and blue, is traditional in the field of art. Sir Isaac Newton developed the first circular diagram of colors in 1666. ... In traditional color theory (used in paint and pigments), primary colors are the 3 pigment colors that cannot be mixed or formed by any combination of other colors.

Explanation:

5 0
3 years ago
Steve left his computer switched on in his room and went out to have breakfast. When he returned, he saw that the monitor had be
yanalaym [24]

Answer:

B

Explanation:

5 0
4 years ago
List three things to be safer online.
kenny6666 [7]

Answer:

1. do not give out your age

2. don't use your real name unless you are supervised

3.dont put all your information out there

5 0
3 years ago
Switched Ethernet, similar to shared Ethernet, must incorporate CSMA/CD to handle data collisions. True False
valentinak56 [21]

Answer:

False

Explanation:

The Carrier-sense multiple access with collision detection (CSMA/CD) technology was used in pioneer Ethernet to allow for local area networking.  Carrier-sensing aids transmission while the collision detection feature recognizes interfering transmissions from other stations and signals a jam. This means that transmission of the frame must temporarily stop until the interfering signal is abated.

The advent of Ethernet Switches resulted in a displacement of the CSMA/CD functionality.

4 0
3 years ago
Other questions:
  • One of the best examples of outcome control is the re-hiring of Steve Jobs by Apple as CEO
    14·1 answer
  • You are performing a manual WLAN RF site survey in a location that has several long hallways with small offices on both sides. Y
    8·1 answer
  • What is the answer to this question on the thing I'm doing in apex
    6·1 answer
  • Write a program that produces this output:
    10·1 answer
  • supppose we already have a list called words, containing all the words(i.e., string).Write code that produce a sorted list with
    14·1 answer
  • What does a production possibilities curve represent?Which of the following statements are true? Economic stability means fair d
    9·1 answer
  • What type of values are typically stores in unweighted graphs
    5·1 answer
  • Describing Report Tools Functions
    9·1 answer
  • Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
    12·1 answer
  • Character positions in<br> arrays start counting with<br> the number 1.<br> True<br> False
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!