1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
10

Given positive integer numinsects, write a while loop that prints that number doubled without reaching 100. follow each number w

ith a space. after the loop, print a newline. ex: if numinsects = 8, print
Computers and Technology
1 answer:
hichkok12 [17]3 years ago
3 0
Hi,

the program is as follows
___________________________________________________________


import java.io.*;
class doubleval

  {
     public static void main()throws IOException   
     {

       DataInputStream dt=new DataInputStream(System.in); 

System.out.println("Enter NUMBER WHOSE DOUBLE U WANT TO                                           PRINT");       
            int n=Integer.parseInt(dt.readLine()); 

                  for(int i=n;i<=100;i=2*i)       
                    {           
                         System.out.println(i);       
                            }   
            }
}


           
You might be interested in
HELPPPP MEEEE!!!!! ITS LIFE OR MUERTEEE
garri49 [273]

The author uses the text structure of compare and contrast to show multiple signals.

<h3>What is Text structures?</h3>

This is a term that connote the method used by authors to put together information in text.

Note that in the case above, The author uses the text structure of compare and contrast to show multiple signals.

Learn more about text structure from

brainly.com/question/12053427

#SPJ1

8 0
2 years ago
The ____ command is used to disconnect a datatable object from the database. (
lisabon 2012 [21]
The delete from command I think
7 0
3 years ago
Read 2 more answers
Persons who have been given access to an installation can be counted on to be of no threat. true or false? (antiterrorism scenar
aliya0001 [1]
<span>The statement that "Persons who have been given access to an installation can be counted on to be of no threat" is false. If they are not honest enough, they could become the dangerous staff the company could ever had because he or she has access to everything, files, information, etc. That is why, in selecting a person to be trusted with such responsibility, he or she undergoes an intensive training.</span>
4 0
3 years ago
Overheating of a computer can be easily prevented. Explain how​
elixir [45]
Here are a few examples:

•] Keep away from windows or vents to prevent it from turning warm.

•] Clean off dust that’s on the computer.

•] Remove all the things that are blocking air to pass to let it cool down.

•] Putting a soft item below the computer is a action that is prohibited as it blocks the airways which causes it to overheat instead put it on a sturdy flat surface to prevent the aforementioned information.

•] To never overcharge your computer too 100% overnight or any time of the day since it overheats and causes battery life to be short, instead put it to charge when you’re conscious while keeping an eye on it, perhaps set a timer/alarm to notify you if you forget.
5 0
3 years ago
Which type of mountain is formed due to the collision of two different kinds of plates?
Lyrx [107]
D) Andean mountains are formed due to the collision of two different kinds of plates.
6 0
3 years ago
Read 2 more answers
Other questions:
  • An expression that has correctly paired delimiters is called a(n)
    6·1 answer
  • Give a recursive algorithm that takes as input a string s, removes the blank characters and reverses the string. For example, on
    7·1 answer
  • Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to
    5·1 answer
  • What are the concerns surrounding 5G cellular networks?​
    6·1 answer
  • Sometimes we care about the order of a list, and need to reorder the items according to a condition (alphabetical, numerical, et
    11·2 answers
  • Place the steps for attaching a file to a message in order from top to bottom.
    12·1 answer
  • Colorful bead bracelet in codehs
    14·1 answer
  • Write a Python program that uses three variables. The variables in your program
    12·1 answer
  • Consider the following implementation of a search method:
    13·2 answers
  • Consider a game that is searched using random restart hill climbing strategy. Assume that the success rate for the game is 25%.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!