1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
5

In C please:

Computers and Technology
1 answer:
kumpel [21]3 years ago
7 0

Answer:

The C code is explained below. The highlighted code represents the "your solution goes here" section

Explanation:

//Header file section

#include <stdio.h>

//Program begins with a main method

int main(void)

{

//Declare the integer variables

int userNum1;

int userNum2;

//Initialized the values to the variables

userNum1 = 1;

userNum2 = 14;

// If userNum1 is less than 0, then print "userNum1 is negative".

// '\n' represents end with newline

if (userNum1<0)

{

 printf("userNum1 is negative. \n");

}

//If userNum2 is greater than 10, then convert userNum2 to 0.

//Otherwise, print "userNum2 is less than or equal to 10"

if (userNum2>10)

{

 userNum2 = 0;

}

else

{

 printf("userNum2 is less than or equal to 10.");

 //'\n' represents end with newline

 printf("\n");

}

//Print userNum2 value

printf("userNum2 is %d. \n", userNum2);

return 0;

}

You might be interested in
Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
VikaD [51]

Answer:

I would say that if she is connected to the server and has grained access to the server, Wendy would have to use the command shortkey win+r (to run) or she could just use the "Type here to search" function.

Then you can type the words "cmd" to bring up the command prompt

Lastly, she would need to use the protocol scp to transfer files. Wendy might need to include a destination for the files to be directed to.

7 0
3 years ago
What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
Mashcka [7]

Answer:oof

Explanation:

4 0
3 years ago
Read 2 more answers
You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime
murzikaleks [220]

Answer:

Explanation:

Attached is the solution

3 0
3 years ago
The file extension of MS-Word document in office 2007 is?(a) .pdf (b) .doc (c) .docx (d) .txt
serious [3.7K]
It is usually .doc but if you use notepad, (the free version of Word) it's .docx
5 0
3 years ago
Read 2 more answers
8.4 Lesson Practice <br> edhesive quiz
kow [346]

Answer:

1. 5

2. Because they let us quickly process the contents of an array, which have many values.

Explanation:

8 0
3 years ago
Other questions:
  • Derek has an interest in designing video games. What requirements should he fulfill to be a game designer?
    13·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills
    5·1 answer
  • What helped Taylor through her tough time with being bullied
    7·1 answer
  • Which agency coordinate the Internet's IP addressing and DNS system.
    15·1 answer
  • What was the original motivation for developing the internet?
    7·1 answer
  • Write a program that asks for the names of three runners and the time, in minutes (no seconds, etc.), it took each of them to fi
    7·1 answer
  • What is your favourite video game??​
    5·2 answers
  • In the value chain concept, upgrading IT is considered what kind of activity?
    9·1 answer
  • Why media is far from government​
    6·2 answers
  • What can i say back to my IT school lady?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!