1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir [108]
3 years ago
10

Write code that prints: Ready! firstNumber ... 2 1 Run! Your code should contain a for loop. Print a newline after each number a

nd after each line of text Ex: firstNumber
Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
5 0

Answer:

The program to this question can be describes as follows:

Program:

#include <stdio.h> //defining header file

int main() //defining main method

{

int n,i,x=0; //defining integer variable

printf("Enter a number: "); //print message

scanf("%d",&n); //input value from the user  

printf("%d\n",n); //print input value

for(i=1;i<n;i++)  //loop to count reverse number

{

x=n-i; //calculate value

printf("%d\n",x);  //print value

}

return 0;

}

Output:

Enter a number: 3

3

2

1

Explanation:

  • In the above program, three integer variable "n,i and x" is declared, in which variable n we take input from the user end and the variable i and x is used in the loop to calculate the value in the reverse order.
  • In the next step, a loop is declared, in which the variable x calculates the value in reverse order and uses a print method to print its value.  
You might be interested in
which server edition doesn't support any server roles that you would typically use with standard version
ioda

On the standard version of Microsoft Windows, Dynamic Host Configuration Protocol Server and Hyper-V Remote Access are two roles that aren't supported on Azure Virtual Machines - a type of server.

<h3>What is a Server?</h3>

It is to be noted that this is a computer device (hardware) or virtual environment (software) that feeds another computer with special services.

<h3>Type of Server</h3>

The following are various types of servers:

  • Webserver
  • Proxy Server
  • Virtual Machine (VM)
  • Database Server
  • Mail Server

See the link below for more about Servers:

brainly.com/question/25435769

8 0
3 years ago
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
lions [1.4K]

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

5 0
3 years ago
What does spyware do on your computer?
faust18 [17]
Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owners private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. if this helps any....
6 0
3 years ago
Java 2D Drawing Application. The application will contain the following elements:
kenny6666 [7]

Answer:

sadness and depression is my answer

Explanation:

5 0
3 years ago
Which term describes a character used to separate items in a text file?
frosja888 [35]

Answer:

extension describes a character used to separate items in a text

6 0
3 years ago
Other questions:
  • Why is it important to use standard english when applying for a job
    13·2 answers
  • Extended ACLs can filter traffic based on _____. (Points : 3) protocol type
    8·1 answer
  • Li Chang has recently started his own business. He plans to launch his design for an application (app) for a smartphone. All of
    9·1 answer
  • Which task is most suitable for creating an algorithm?
    15·2 answers
  • The Many–Hands Problem makes it difficult to determine who should be held accountable for mistakes since:
    7·1 answer
  • What is the advantage of using a translation look-aside buffer (TLB), also called associative memory, in the logical-physical ad
    15·1 answer
  • Write the issue related to the cyber ethnic. ​
    7·2 answers
  • What is the function of ROM?
    10·1 answer
  • Which of the following BEST describes the part of video or movie creation during which filming occurs, digital modelers create a
    9·2 answers
  • True or Fale A criminal defense attorney's main focus is to convict the accused of a crime, and a state prosecutor is to defend
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!