1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GREYUIT [131]
4 years ago
12

Write a program that finds the largest in a series of numbers entered by the user.The program must prompt the user to enter numb

ers one by one.When the user enters 0 or a negative number, the program must display the largest nonnegative number entered:Enter a number:60Enter a number:38.3Enter a number:4.89Enter a number:100.62Enter a number:75.2295Enter a number: 0The largest number entered was 100.62.
Computers and Technology
1 answer:
Kobotan [32]4 years ago
4 0

Answer:

Here is c program:

#include<stdio.h>

#include<conio.h>

void main()

{

//Variable declaration

//array to hold 6 values you can change this as needed

float nums[6];

//integer i is for loop variable

int i;

//to hold maximum value

float max=0.0;

//clear screen

clrscr();

//iterate 6 times you can change as per your need

for(i=0;i<6;i++)

{

printf("Enter a number:");

scanf("%f",&nums[i]);

//check if entered value is greater than previous value

//if it is greater then assign it

if(nums[i]>max)

max = nums[i];

}

//print the value

printf("The largest number entered was %f",max);

getch();

}

Explanation:

You might be interested in
When does the VB.NET programming environment start to operate?
drek231 [11]

Answer:

B. once a VB.NET project is created in the Microsoft Visual Studio environment.

Explanation:

Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.

5 0
4 years ago
Plese give three examples of specilized servers.
MariettaO [177]
1.Extended border node (EBN)
2.Central directory server (CDS)
3.Branch extender (BEX or BrEx or BrNN)
5 0
3 years ago
Read 2 more answers
Which best described most television in the 1940s and 1950s? color cable 24 hour black and white
Semenov [28]

Answer:

The answer is "black and white".

Explanation:

During this period of live TV output in the United States, from the late 1940s to late 1950, the era between the 1940s and 1950s is often regarded as the first Golden Age of Television.  

It is the monochrome broadcast tv signal transmission and reception system. At the end of the 1940s, in 50 major cities, there were 98 commercial tv channels. TV sets costs also reduced by 1949.

8 0
3 years ago
Choose the word pair that would best complete this analogy <br> annihilation : obliteration
iogann1982 [59]
Annihilation : obliteration

if the choices were:

strategy : tactics
sensation : numbness
deliberation : impulsiveness
endeavor : quit 

Then the word pair that would best complete the analogy is:
STRATEGY : TACTICS

Annihilation and obliteration are synonymous. In fact, annihilation is defined as complete destruction or complete obliteration. Obliteration is defined as total destruction.

Strategy and tactics are also synonymous. They both mean a system or mode of procedure or a plan of action.

The rest of the choices are antonyms.
8 0
3 years ago
In 1-2 pages, identify a social networking technology and identify at least 10 security and/or privacy risks the technology has
algol13

Answer:

One of the biggest social media giants has faced many such security and privacy risks in the past 3 years. 10 are listed below:

1. No one can forget the New Zealand attack on the mosque, and it was telecast live via it. And that is certainly a security risk. And if someone is able to stream live, the AI is in question definitely as this cannot be telecast.

2. Can you forget the various US shooting cases in the past 5 years? And many out of them where telecast lives on it. Again the AI, and the authentication is in question.

3. Many evils have many times advertised itself through it, and that is a security risk. This put up the question on the Data Scientists of the company.

4. It's a huge data on it, and many users have been able to misuse it, and that is a security risk. This put up the question mark on the application of the Big Data.

5. Once, the UK parliament questioned it to sell the secret data, and that was a privacy risk.

6. An Engineer was caught negotiating to sell secret users data to a third party, and that is a privacy risk as well as a question on management technology, as its possible now to check these kind of frauds.

7. Its accounts have been hacked many times, as well as millions of user-profiles, were stolen. This is a security and privacy risk.

8. Its data is still not safe as evils have proved they can break the authentication. However, it has reacted well, and they look like being a safe destination now.

9. Once, someone from Russia was caught collecting a lot of data from it. That was a security and privacy risk. And surely if someone is uploading a lot of complicated and confidential data, must be checked through proper AI implementation.

10. In India too there have been claims that a lot of personal information during elections 2014 was sold. That was a security and data risk. And the data scientists were proved vulnerable again. Its quite sure hence, a lot of work has to be done in Data Science and Artificial intelligence still.

However, its owner is one of the finest souls on earth. He donated all his money when he was blessed with a child. Some out of his team cheated, and else some technology failure or the huge amount of data was the reason for the fault. However, other companies are also facing such problems. And hence, he cannot be blamed for this. And the company now definitely has recovered from the nightmare that they faced in the past 3 years.

Explanation:

The answer is self explanatory.

8 0
3 years ago
Other questions:
  • Write a program that defines a type for a structure that stores information on a student in ENG EK 125. Declare two variables to
    8·1 answer
  • Which statement is the best description of a value proposition?
    7·2 answers
  • Technological progress has reduced the cost of manufacturing mp3 players. what happens if demand is unchanged?
    9·1 answer
  • The main events of the civil war and reconstruction
    14·1 answer
  • Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is consi
    6·1 answer
  • Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
    6·1 answer
  • Displays unsolicited advertisements in banners or pop-up windows
    5·1 answer
  • 2.cite at least 2 example on how multimedia facilitates learning​
    6·1 answer
  • MENCIONA ¿POR QUÉ SURGE EL CIVISMO TECNOLOGICO?
    6·1 answer
  • marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particu
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!