1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Umnica [9.8K]
3 years ago
6

Write a function called printEvens that prints all the even numbers between 2 and 20, inclusive. It will take no arguments and r

eturn nothing. You must also use a looping statement in the code to get credit for printing (i.e. no cout << 2 << " " << 4 " " << ...).
Computers and Technology
1 answer:
nataly862011 [7]3 years ago
3 0

Answer:

#include <iostream>

using namespace std;

void printEvens() {

   for (int i = 2; i <= 20; i++) {

       if (i % 2 == 0)

           cout << i << " ";

   }

}

int main() {

   printEvens();

   return 0;

}

Explanation:

- Inside the function, initialize a for loop that <u>goes from 2 to 20</u>.

- Inside the for loop, check if the <u>numbers are divisible by 2</u>. If yes, print the number

- Inside the main, call the function

You might be interested in
Data collected before an attorney issues a memo for an attorney-client privilege case is protected under the confidential work p
Shalnov [3]

Answer:False

Explanation: Attorney-client previlege is a rule that protects the confidentiality of the communication between the clients and the lawyer(attorney). This rule is put in place to encourage clients to communicate freely and give out adequate and necessary information in order for the Attorney to effectively handle the case. ANY DATA COLLECTED BEFORE THE ATTORNEY ISSUES A MEMO FOR AN ATTORNEY-CLIENT PRIVILEGE CASE IS NOT PROTECTED UNDER THE CONFIDENTIAL WORK PRODUCT RULE WHICH GUARANTEES THAT NO INFORMATION AFTER THAT MEMO SHALL BE DIVULGED WITHOUT APPROPRIATE CONSIDERATIONS.

7 0
4 years ago
Read 2 more answers
Letter diagrams are least useful for showing:
ser-zykov [4K]
The answer is c .....
4 0
3 years ago
Complete the following sentences by choosing the best answer from the drop-down menus.
aleksandrvk [35]

Answer:

b. Application software

Explanation:

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

Examples:

Microsoft Office Word, Excel, Powerpoint

i think i did that right:)

7 0
3 years ago
The theory advanced by Adam Smith,
tester [92]

Answer:

Definition: The unobservable market force that helps the demand and supply of goods in a free market to reach equilibrium automatically is the invisible hand. Description: The phrase invisible hand was introduced by Adam Smith in his book 'The Wealth of Nations'.

so ans is the invisible hand

hope help full thnk u❤️❤️❤️

3 0
3 years ago
An administrator has several cables plugged into a patch panel and needs to determine which one comes from a specific port. Whic
Pavel [41]

Answer:

Tone Generator and Probe

Explanation:

Tone generator is the device that generate a signal while probe is used to detect the signal. During the cables are connected to different port while establishing a system, it is required to check the cables that are connected to different ports.

With the help of tone generator, a signal has been sent through the cables that need to checked before connection. The signal are tested on the other end of the cable to determine the different types of cable that are connected to different ports.

So, the administrator should use tone generator and probe to determine that which cable is connected to which port.

7 0
3 years ago
Other questions:
  • Write a cout statement that prints the value of a conditional expression. The conditional expression should determine whether th
    7·1 answer
  • While conducting a vulnerability assessment, you're given a set of documents representing the network's intended security config
    12·1 answer
  • Hailey is preparing a questionnaire on the different number systems. He asks the students to write down the correct decimal and
    7·2 answers
  • How to download goose simulator the game for free<br><br>pls tell me
    6·2 answers
  • Is the following an example of social media viral marketing? Indicate your response by selecting Yes or No.
    7·1 answer
  • In the lecture, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you
    10·1 answer
  • Devices inserted into a computer that give it added capabilities
    13·1 answer
  • To recover from driving off the road steer back onto the road in then ?
    14·2 answers
  • What is the benefit of making an archive folder visible in the Outlook folder list?
    6·1 answer
  • Which examples are relevant sources for students to use in research?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!