1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
4 years ago
10

14.18 Lab 5d - Nested Looping Write a program that:

Computers and Technology
1 answer:
alexandr1967 [171]4 years ago
4 0

Answer:

Using C++ for the nested looped program.

NOTE: Each digit in string prints '+'

Explanation:

#include <iostream>

#include <string>

using namespace std;

int main() {

   string s;

   cin >> s;

   for (int i = 0; i < s.length(); ++i) {

       for (int j = 0; j < s[i]-'0'; ++j) {

           cout << "+";

       }

       cout << endl;

   }

   return 0;

}

You might be interested in
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
Which of the following questions will most likely be answered by displaying data on a line graph?
Artemon [7]
I'm pretty sure the answer is b
4 0
4 years ago
Which of the following is NOT true about Parvati's web search? Group of answer choices a) She will enter the desired search text
shepuryov [24]

Answer:

The answer is letter A

Explanation:

<em>She will enter the desired search text in the query box. This statement is NOT TRUE</em>

3 0
3 years ago
What are the difference between bit address 7ch and byte address 7ch
kirill115 [55]

so a byte address can only send  a get bytes (8 bits)

when a bit address can be more detailed as it can send a get not only bytes but bits also

-scav

5 0
3 years ago
What is wrong with the following program? #include //Line 1 namespace aaa //Line 2 { const int X = 0; //Line 3 double y; //Line
Nataly [62]

Answer:

#include //Line 1

namespace aaa //Line 2

{ const int X = 0; //Line 3

double y; //Line 4

}

using namespace std; //Line 5

int main() //Line 6

{ y = 34.50; //Line 7

cout << "X = " << X << ", y = " << y << endl; //Line 8

return 0; //Line 9

}

In Line 1, No header file is present,so it will print output as cout and endl is not defined.

we should include <iostream> header file in line 1  

Lines 7 and 8 are incorrect.

X and y variables in aaa namespace are stated. So we can't use it any other namespace(std), but here y is initialized to 34.50 and x is printed in other namespace rather than stated.

3 0
3 years ago
Other questions:
  • To reach fifty million users, it took _____.
    10·2 answers
  • Which leadership function involves keeping group members focused on the issue at hand?
    6·1 answer
  • Instructions:Select the correct answer.
    8·2 answers
  • For this question you must write a java class called Rectangle and a client class called RectangleClient. The partial Rectangle
    14·1 answer
  • Go in my discord server Code is . (CebjBXN)​
    10·2 answers
  • अस्स्मन्चचरे ------------------- दृश्यते |
    8·1 answer
  • Sensitive data is always classified true or false
    14·1 answer
  • Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any n
    12·1 answer
  • Write a program to Test if mold is stored in the variable word.
    5·1 answer
  • When adopting and implementing a software as a service (saas) platform such as salesforce for your business, which responsibilit
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!