1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
4 years ago
10

Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha

s an infinite loop, the system will stop running the code after a few seconds and report "Program end never reached." The system doesn't print the test case that caused the reported message. Sample outputs with inputs: 9 5 2 -1 Body Body Body Done.
Computers and Technology
1 answer:
Mama L [17]4 years ago
8 0

In the program While loop is used. In the while loop it divides the userNum by 2 in each iteration and prints the value of userNum. The inputs and corresponding outputs are written in the explanation.

<u>Explanation</u>:

In the while loop it divides the userNum by 2 in each iteration and prints the value of userNum.

import java.util.Scanner;  

public class NonNegativeLooper

public static void main (String [] args)

Scanner scnr = new Scanner(System.in);  

//initialize the userNum with 9

int userNum = 9;

//Repeat the loop until the userNum is not negative

while (userNum>=0)

System.out.println(Body);

//Prompt the user to enter the usrNum again

userNum = scnr.nextInt();

System.out.println(Done.);

return;

You might be interested in
The _____ feature enables you to represent text as colorful visuals.
Radda [10]

Answer:

complex formatting feature enables you to represent text as colorful

visuals.

mark as brainliest

4 0
2 years ago
The CMOS battery located on a computer's motherboard allows for maintaining the correct time and date information stored in CMOS
siniylev [52]

Answer:

True                

Explanation:

  • CMOS (complementary metal-oxide-semiconductor) is a chip which is placed on the motherboard in order to store the system date and time and this is powered by a CMOS battery which is housed inside this chip and is used to manage the date and time when the system is off.
  • This is a long lasting battery which can work till the life of a motherboard.
  • This battery is also used to maintain BIOS settings and hardware settings and BIOS uses it during the booting process in order to retrieve the stored information regarding the hardware or system date time.
  • CMOS chip is basically volatile and cannot retain settings information when the computer system powers off but the CMOS battery helps to maintain these setting just like system time and date when the computer gets shut down.
4 0
4 years ago
If you want to conserve ink or toner, you can instruct powerpoint to print ____ documents.
11Alexandr11 [23.1K]
The answer is B) draft quality
8 0
3 years ago
This is your code.
topjm [15]

Answer:

11

Explanation:

the second in the d aray is c because to call the first value, it is d[0]. So, to call c, you put d[2]. And the 0 of the c array, or the 0 of the 2 of the d array, it is 11

put it in a program. I use JS so if you have an Apple, open script editor and change the script from AppleScript to JavaScript and put in this code:

var a = [5, 10, 15];

var b = [2, 4, 6];

var C = [11, 33, 55];

var d = [a, b, C];

d[2][0];

3 0
3 years ago
What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
snow_tiger [21]
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
8 0
4 years ago
Other questions:
  • _____ is two or more connected computers.
    8·1 answer
  • 1. Write a bash script to create 3 files of different size greater than 1700 kb and less than 1800 kb . The 2. Content of the fi
    9·1 answer
  • The _____ function is a logical function that returns a TRUE value if any of the logical conditions are true and a FALSE value i
    10·1 answer
  • Optimizing a network to handle more traffic by adding new specialized software is an example of ______ scaling. Adding additiona
    9·1 answer
  • "A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, an
    5·1 answer
  • In ____________________ testing, security personnel simulate or perform specific and controlled attacks to compromise or disrupt
    10·1 answer
  • Assume the existence of an UNSORTED ARRAY of n characters. You are to trace the CS111Sort algorithm (as described here) to reord
    14·1 answer
  • If you have limited means, you...?
    9·1 answer
  • Cleo is new to object oriented programming. which type of action can be taken on on object?
    14·2 answers
  • The success criteria are used to judge whether a project is successful. False True <br> need it now
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!