1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
4 years ago
8

Print 'userNum1 is negative" if userNum1 is less than 0. End with newline Convert userNum2 to 0 if userNum2 is greater than 9. O

therwise, print "userNum2 is less than or equal to 9:. End with newline 3 int main(void) 4 int userNuml; S int userNum2; 6 7 userNum1-1; 8 userNum2 7 10 if (userNum1) printf "userNum1 is negative.n 12 13 if(userNum2-9 14 15 16 17 print f("userNum2 18 19 return ; printf("userNum2 is less than or equal to 9.\n; Your solution goes here is%d.\n", use rNur?); 20 Check Try again x A possible solution uses an if statement for userNum1, and an if-else statement for userNum2 x Testing for correct output for userNum 1 = 0 and userNum2 = 10 Output differs.
Computers and Technology
1 answer:
dlinn [17]4 years ago
8 0

Answer:

#include <stdio.h>

int main()

{

   int userNum1;

   int userNum2;

   

   userNum1 = -1;

   userNum2 = 7;

   

   if (userNum1 < 0)

       printf("userNum1 is negative. \n");

       

   if(userNum2 > 9)

       userNum2 = 0;

   else

       printf("userNum2 is less than or equal to 9.\n");

   return 0;

}

Explanation:  

Initialize userNum1 and userNum2.

If userNum1 is less than 0, print 'userNum1 is negative" and end with newline.

if userNum2 is greater than 9, assign 0 to userNum2.

Otherwise, print "userNum2 is less than or equal to 9 and end with newline.

You might be interested in
_____ provide a description of the data characteristics and the set of relationships that link the data found within the databas
Karolina [17]

Answer:

The correct answer to the following question will be "Metadata".

Explanation:

Metadata is "information providing information on other data" This is "data about data", in other words.

There are many subareas of metadata, including:

  • Structural metadata
  • Iscriptive metadata
  • Statistical metadata
  • Reference metadata
  • Administrative metadata

Metadata gives a summary of the features of the data and the collection of relationships that connect the data found in the database.

It defines other details, is a prefix in most uses of computing means "an underlying meaning or description. Very simple document metadata are, for example, creator, date generated and date changed and file size.

Therefore, Metadata is the right answer.

6 0
3 years ago
Which of the following sentences is accurate? a. PDF stands for "Proofreading Direct Files." b. PDF files cannot be edited. c. B
olga_2 [115]

Answer: Option (c) is correct

Explanation:

PDF is portable document format that come in form of file format .It is used for sharing and transmitting between computing and operating systems for viewing and printing in actual page layout. They can be used fro eBooks ,scanned document and text etc.

  • Other options are incorrect because not all business organization use PDF, PDF has the capability of being edited and it stands for "portable document format".
  • Thus, the correct option is option(c)
8 0
3 years ago
_ is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of v
Jet001 [13]

Answer:

Cloud computing is the correct answer of this question.

Explanation:

Cloud computing presents a easy way of consuming databases, servers, repositories and a vast variety of web technology infrastructure.Cloud computing allows that can save considerable construction costs without relying on internal server resources and device requirements.Cloud computing is the provision of various resources over the Web.

8 0
3 years ago
Somehow I lost 1000 points!!! Does anyone know what happened? Is it possible that I was hacked? ​
Dima020 [189]

Answer:

Explanation:

You most likely lost 1000 points because you cheated to get them if not there is a possibility you were.

6 0
3 years ago
Read 2 more answers
Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
HACTEHA [7]

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

8 0
3 years ago
Other questions:
  • Of the different IRT roles, the _______________ is head of the team and issues the ultimate call regarding how to respond to an
    15·1 answer
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someon
    12·1 answer
  • Wireless network devices use ________ to communicate with each other.
    9·2 answers
  • True or False?
    8·1 answer
  • When you connect a device to your computer for the first time, Windows Media Player selects the ____ method that works best for
    15·2 answers
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • Question 1 (1 point)
    9·1 answer
  • Write a program that asks the user for the name of a text file. The program should display the first 10 lines of the file on the
    6·1 answer
  • I have all of the points and brainliest, but it won't level up, I don't know why, anyone know why?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!