1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
8

Print 'userNum1 is negative" if userNum1 is less than 0. End with newline Convert userNum2 to 0 if userNum2 is greater than 9. O

therwise, print "userNum2 is less than or equal to 9:. End with newline 3 int main(void) 4 int userNuml; S int userNum2; 6 7 userNum1-1; 8 userNum2 7 10 if (userNum1) printf "userNum1 is negative.n 12 13 if(userNum2-9 14 15 16 17 print f("userNum2 18 19 return ; printf("userNum2 is less than or equal to 9.\n; Your solution goes here is%d.\n", use rNur?); 20 Check Try again x A possible solution uses an if statement for userNum1, and an if-else statement for userNum2 x Testing for correct output for userNum 1 = 0 and userNum2 = 10 Output differs.
Computers and Technology
1 answer:
dlinn [17]3 years ago
8 0

Answer:

#include <stdio.h>

int main()

{

   int userNum1;

   int userNum2;

   

   userNum1 = -1;

   userNum2 = 7;

   

   if (userNum1 < 0)

       printf("userNum1 is negative. \n");

       

   if(userNum2 > 9)

       userNum2 = 0;

   else

       printf("userNum2 is less than or equal to 9.\n");

   return 0;

}

Explanation:  

Initialize userNum1 and userNum2.

If userNum1 is less than 0, print 'userNum1 is negative" and end with newline.

if userNum2 is greater than 9, assign 0 to userNum2.

Otherwise, print "userNum2 is less than or equal to 9 and end with newline.

You might be interested in
After data is collected, how is it analyzed?
professor190 [17]

Answer:

It’s input into a computer and saved for future use

Explanation:

Step 1: Identify issues and/or opportunities for collecting data

The first step is to identify issues and/or opportunities for collecting data and to decide what next steps to take. To do this, it may be helpful to conduct an internal and external assessment to understand what is happening inside and outside of your organization.

-----------------------------------------------------------------------------------------------------------------

Step 2: Select issues and/or opportunities and set goals

The focus of Step 2 is choosing a priority issues and/or opportunities for collecting data, and then setting goals and objectives.

The organization reviews the issues and/or opportunities identified from the internal and external assessment done in Step 1, and picks one or more specific issues and/or opportunities for starting a data collection project from among the list of priorities. Some of the questions an organization can consider when deciding to prioritize an issue and/or opportunity for gathering data

-----------------------------------------------------------------------------------------------------------------

Step 3: Plan an approach and methods

In Step 3, organizations will make decisions about who will be surveyed, how data will be collected, the sources of data that will be used, and the duration of the data collection project, among other questions. These decisions may be made in consultation with an expert. The methods and approaches will flow from the goals set in Step 2, and will vary significantly depending on a number of factors, including the organization’s context, size, resources, and the purpose and complexity of the issue(s) or opportunity(ies) selected.

-----------------------------------------------------------------------------------------------------------------

Step 4: Collect data

When planning on how best to collect data in Step 4, it is important to be aware of the practical considerations and best practices for addressing logistical challenges organizations often face at this stage of the process. Implementing a data collection plan requires attention to matters such as:

  • Getting buy-in from senior leadership and key stakeholders, in or outside of the organization. This group could include boards of directors, management committees, union representatives, employees, community groups, tenants, customers and service users.
  • Establishing a steering committee or selecting a person(s) to be consulted and held accountable for all major decisions about the data collection process, such as design, logistics, communication management, coordination and finances.
  • Determining who will collect the data (e.g., experts or trained employees).
  • Identifying the logistics, resources, technology and people needed to develop and implement a data collection initiative.
  • Anticipating and addressing key stakeholder concerns and questions about the project.
  • Designing a communication and consultation strategy that will explain the data collection initiative and encourage the highest possible participation rate.
  • Protecting privacy and personal information by using carefully controlled procedures for collecting, storing and accessing data that comply with privacy, human rights and other legislation. Dignity and confidentiality must be respected.
  • Minimizing the impact and inconvenience for the people affected in the workplace or service environment, which includes choosing the best time to collect the data.
  • Aiming for flexibility to allow for changes without great expense or inconvenience.
  • Considering a test period or a pilot phase to allow you to improve and modify data collection methods, as may be needed.

-----------------------------------------------------------------------------------------------------------------

Step 5: Analyze and interpret data

Step 5 involves analyzing and interpreting the data collected. Whether quantitative and/or qualitative methods of gathering data are used, the analysis can be complex, or less so, depending on the methods used and the amount of data collected.

-----------------------------------------------------------------------------------------------------------------

Explaining the technical steps involved in analyzing and interpreting data is beyond the scope of this guide. An organization will have to determine whether it has the internal capacity and expertise to analyze and interpret data itself, or whether it will need the help of an external consultant.

-----------------------------------------------------------------------------------------------------------------

Step 6: Act on results

Once an organization has analyzed and interpreted the results of the data collected, it may decide to act on the data, collect more of the same type of data or modify its approach.

8 0
2 years ago
A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa
Harman [31]
False. A trojan horse is a type of malware that misleads as to what it does.
Example: “Click here to download Sims for free!”
You click it, and next thing you know instead of getting Sims for free you have a virus.
5 0
3 years ago
Taking a group of recipes and identifying the similarities is an example of _____.
drek231 [11]

Answer:

Pattern recognition

Explanation:

Y not

4 0
2 years ago
A eclipse occurs at a full moon when the moon passes between earth and the sun
sergeinik [125]

Answer:

When the moon aligns with the sun

Explanation:

common sense

3 0
2 years ago
The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i
saveliy_v [14]

Answer: data loss protection

Explanation:

In any organization or enterprise it is very essential to provide protection from data loss to avoid breaches by unauthorized accesses and to secure the data irrespective of whether it is in rest or motion.

It is known that data changes its form when it is copied, moved and stored in different memory location so in this process a lot of sensitive data might be exposed to the outside world and left into the hands of the unauthorized for easy of access to it.

So once a security breach is possible through the system or into the network of the organization it would expose all the application database, emails, spreadsheets and the personal workstation files. So in such a scenario the importance of data loss protection is highlighted and must be given due importance.

8 0
3 years ago
Other questions:
  • A web __________, such as internet explorer or mozillaâs firefox, allow users to access the world wide web.
    10·1 answer
  • The following algorithm should output the t times table in the format:
    6·1 answer
  • How can i take out a random (double) number in between 5.0 to 15.0 in c++?
    7·1 answer
  • Which resources could be used a lot when installing a desktop app for synchronization purposes? Choose two answers.
    5·1 answer
  • Is this a Bad Cpu processor ? I need some.help ASAP I turn on my.pc and it has no display but everything is on fans and the you
    13·1 answer
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • What is the missing line of code?
    10·2 answers
  • Write a pseudocode statement that declares the variable total so it can hold integers. Initialize the variable with the value 0
    9·1 answer
  • Software that converts program written in other language into machine language​
    11·1 answer
  • In cell b12 create a formula using max f7nction to calculate maximum value in B4:B9
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!