1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adelina 88 [10]
3 years ago
8

How I get input from the user in C? Here's my code now:

Computers and Technology
1 answer:
Nataliya [291]3 years ago
4 0

You must use “scanf” statement to read the input. You must also include the necessary header file to use all the built-in functions in any programming languages.

scanf(“%d”, &number);

Since “scanf” is a statement it must end with the semicolon. “scanf” accepts two parameters, first the type of value and second is the address of the variable to store the given input.

Here “&” represents the address of the given variable. “%d” is used for integer, “%f” is used for float, “%s” is used to receive string inputs, etc.

You might be interested in
If a wire has insulation that allows it to operate in a temperature of up to 194 degrees Fahrenheit, what temperature will the w
zzz [600]
(194°F-32)×5/9
= 90°C
therefore the answer is 90degrees Celcius
6 0
3 years ago
Which is the following is a valid email id<br><br>​
Minchanka [31]

Answer:

sorry there are no options available

6 0
2 years ago
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
Describe how serial data access finds data
jeyben [28]

Answer:

Serial data access will go through all the data by order until the target data is reached

Explanation:

This is opposite of direct data access which immediately finds the desired

data

4 0
3 years ago
Read 2 more answers
The web lab consists of which elements. Select all that apply. Group of answer choices Files Inspector Tool Preview Hints Work S
djverab [1.8K]

Answer:

Inspector Tool

Preview

Work Space

Instructions

Explanation:

Web Lab is a function that incorporates HTML in web development. It has functions such as Workspace where the developer writes the body of the website. Preview helps the developer take a look at the final product of what he is creating. Instructions panel provides a list of the different types of html packages that the developer can chose from.

All of these options help the developer produce a website that is up to standard.

8 0
2 years ago
Other questions:
  • Effective presentations vary the color scheme on each slide.<br><br> True<br> False
    5·2 answers
  • What are youth oraganizations?
    7·1 answer
  • Suppose that we pick the following three tuples from a legal instance of a relation S (S has 100 tuples in total). Relation S ha
    9·1 answer
  • Who created apple and in what year was it created
    9·2 answers
  • Coordinate with
    12·1 answer
  • In an MLA style citation for an image, what information should be listed first? A. The name of the creator B. The title of the i
    8·2 answers
  • When would you use the AutoFit to Contents option?
    15·1 answer
  • Where does change management play a major role in transforming a client
    11·1 answer
  • State the functions of the parts of the computer​
    11·2 answers
  • Give five example of a dedicated device ​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!