1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleks [24]
3 years ago
6

Write a program that removes all spaces from the given input.

Computers and Technology
1 answer:
Aliun [14]3 years ago
4 0

Answer:

Mhmmm

Explanation:

You might be interested in
This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
vesna_86 [32]

Answer:

#include <stdio.h>

int main(void) {

   char triangleChar;

   int triangleHeight;

   printf("Enter a character:\n");

   scanf(" %c", &triangleChar);

   printf("Enter triangle height:\n");

   scanf("%d", &triangleHeight);

   printf("\n");

   int i, j;

   for(i = 0; i < triangleHeight; ++i) {

       for(j = 0; j <= i; ++j) {

           printf("%c ", triangleChar);

       }

       printf("\n");

   }

   return 0;

}

Explanation:

  • Get the character and height as an input from user.
  • Run the outer loop up to the height of triangle.
  • Run the inner loop up to the value of i variable and then display the character inside this loop.
5 0
3 years ago
I am needing help with this homework of mine.
KengaRu [80]
It doesn’t show nothing in the picture
8 0
3 years ago
You can rotate a selected graphic by dragging a ________ rotation handle
kotykmax [81]

I guess the correct answer to the blank is round.

You can rotate a selected graphic by dragging a round rotation handle.

7 0
4 years ago
An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
maxonik [38]

The type of attack which has occurred in this scenario is known as credential harvesting.

<h3>What is credential harvesting?</h3>

Credential harvesting is also known as account harvesting and it can be defined as a type of attack that involves the use of the following techniques to illegally obtain large numbers of user credentials (username or password):

  • MITM attacks
  • DNS poisoning
  • Phishing

In conclusion, the type of attack which was used in this scenario is known as credential harvesting.

Read more on phishing here: brainly.com/question/23850673

#SPJ1

3 0
2 years ago
……………………is one of the most popular cloud storage facilities.​
lord [1]
Chcgzrsfchvuvjbnkggvbbb.
4 0
3 years ago
Other questions:
  • Fill in the function shopSmart(orders,shops) in shopSmart.py, which takes an orderList (like the kind passed in to FruitShop.get
    6·1 answer
  • What is the output <br>this is a computer science question ​
    8·1 answer
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    10·1 answer
  • While these two approaches have similarities in terms of the topics they address, ________ will cover broad IT management topics
    7·1 answer
  • One of your clients is looking into investing in direct participation programs. He is examining several different types of progr
    13·1 answer
  • Use Python.
    7·1 answer
  • Which similar computer network components connect multiple devices?
    7·1 answer
  • Which situation is the best choice for using telehealth?
    12·1 answer
  • Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69
    11·1 answer
  • G. What are handheld computers? Write its types.​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!