1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
4 years ago
15

Write a function named sumNumbers that accepts a nonnegative number, adds up all of the numbers between 0 and the number (inclus

ive), and returns the sum.
Computers and Technology
1 answer:
brilliants [131]4 years ago
5 0

Answer:

int sumNumber(int n){

if(n < 0)

return 0;

int sum = 0;

int i;

for(i = 0; i <= n; i++){

sum = sum + i;

}

return sum;

}

Explanation:

I am going to write a C code for this.

A for loop and an initialized variable is sufficient to solve this problem.

int sumNumber(int n){

if(n < 0)

return 0;

int sum = 0;

int i;

for(i = 0; i <= n; i++){

sum = sum + i;

}

return sum;

}

You might be interested in
When you merge business letters, how many total documents will you have when you are finished with the merge process?
dlinn [17]

Answer:

You will have one letter for every receiver on the table.

Explanation:

In a new Microsoft Word paper, click on the Mailings label, and in the Start Mail Merge collection, agree on Start Mail Merge.

Agree on Step-by-Step Mail Merge Wizard.

Choose your paper model.

Choose the opening paper.

Preferred beneficiaries.

Address the report and attach your custom entries.

6 0
3 years ago
Read 2 more answers
Why is it important to send a cover letter with a resume?
Novay_Z [31]
It's important to do so because you want to be sure it looks professional, just like it's important to add a cover to a report. It's also the first look at the resume and gives the overall look of it. It lets the job or employer know the specifics and into the resume talk more of what you do. It's like the overall information page..... Hope this helps. 
5 0
3 years ago
Read 2 more answers
When a Select Case statement executes, the value of the test expression is compared with the values that follow each of the ____
goldenfox [79]

Answer:

Case

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

A Select Case statement can be defined as a conditional statement that avails software developers or programmers the ability to test a variable by comparing it with a list of values.

In a Select Case statement, each variable is referred to as a Case.

Generally, when a Select Case statement executes, the value of the test expression is compared with the values that follow each of the Case keywords.

7 0
3 years ago
[ANSWER = BRAINLIEST] How to mark an answer as brainliest?
Hoochie [10]

Answer:

once your question is answered you get an option available on the bottom of the answer

<em>see attached</em>

and you click on<u> Mark as brainliest </u>

8 0
4 years ago
Read 2 more answers
In the context of IT jobs in the information systems field. A ____ is responsible for database design and implementation
Yuri [45]

Answer: Database Administrator.

A Database Administrator is responsible for any design and implementation of a database in a system. They are also the people who make sure that they can secure and manage all the data in their system to avoid any problems that may occur during its usage.

They also are responsible for keeping track of changes and the accessibility of the users that will be inputting data into the database. This most especially applies to databases that are meant to keep client information and transactions for most companies.

8 0
3 years ago
Read 2 more answers
Other questions:
  • You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network I
    13·1 answer
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • To execute a prepared SQL statement, you can use the _______ and execute methods of the PDOStatement object to set parameter val
    9·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    12·2 answers
  • To combat piracy, many software publishers require users to type in a(n) ____ code, a sequence of numbers and letters in order t
    10·1 answer
  • What is not an option when a user is exporting contacts to share with others?
    10·1 answer
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • What is the output?<br> str = 'abcdef<br> print(str[2:50)
    6·2 answers
  • PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST
    12·1 answer
  • Help fast pls
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!