1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
3 years ago
5

Wap to input any multi digits number and display the sum of odd digits and even digits​

Computers and Technology
1 answer:
Kobotan [32]3 years ago
5 0
Do you have an image?
You might be interested in
1. ¿Qué es un cursograma?
erma4kov [3.2K]

Answer:

Un cursograma permite representar gráficamente procedimientos administrativos. Constituyen instrumentos importantes para la visualización global y esquemática del conjunto de tareas administrativas.

6 0
3 years ago
Read 2 more answers
Which network protocol is used to route IP addresses?<br>A. TCP<br>B. UDP<br>C. IP<br>D. ICMP
ladessa [460]

Answer:

C. IPIP

Explanation:

This protocol is known as an IP that stands for Internet Protocol. This protocol handles the simple task of making sure that the information is routed correctly to and from the corresponding computer machines through the internet. The sending and receiving machines are identified through their Internet Protocol Addresses which lets the protocol know exactly where the information is going and being sent from.

8 0
4 years ago
A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text mess
tensa zangetsu [6.8K]

Answer:

A. Multifactor authentication

Explanation:

Multifactor authentication is a security system process that requires a user to verify his or her identity by providing two categories of credentials.

A mobile device user has entered her user ID and password to access an online account, she immediately receives a text message with a unique PIN or One Time Password (OTP) that must be entered before she is granted access to the account. This is an example of a multifactor authentication security method.

8 0
3 years ago
Shadow and highlight create depth (3D).<br> TRUE OR FALSE
tamaranim1 [39]

Answer:

true because then it would be like not popping out

7 0
3 years ago
Select all that apply. Two physical things you can do to demonstrate you are paying attention to a speaker are _____ and _____.
omeli [17]
B and d ............
7 0
3 years ago
Read 2 more answers
Other questions:
  • Select all examples of proper keyboarding technique.
    15·2 answers
  • Given an int as the input, print all the factors of that number, one in each line. For example, if the input is 15 The output wi
    14·2 answers
  • In DTP, a good rule of thumb is to use as many special effects as you need to make your documents look interesting.
    5·1 answer
  • How do I mirror cast my smart lg tv?​
    11·1 answer
  • This refers to the people involved in the data processing operation.
    14·1 answer
  • Which of the following is NOT necessary for organizing data to make it easier to sort?
    6·1 answer
  • Use of multimedia in business sector...​?
    5·1 answer
  • _____ is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.
    15·2 answers
  • Explain how files can be identified as entities on the magnetic surface?
    8·1 answer
  • Hey everyone please let my friends answer please?????? .
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!