1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
3 years ago
11

Write an expression that executes the loop body as long as the user enters a non-negative number.Note: If the submitted code has

an infinite loop, the system will stop running the code after a few seconds and report "Program end never reached." The system doesn't print the test case that caused the reported message.Sample outputs with inputs: 9 5 2 -1BodyBodyBodyDone.

Computers and Technology
1 answer:
Eva8 [605]3 years ago
5 0

Answer:

See attached picture.

Explanation:

See attached picture for explanation.

You might be interested in
A developer writes a trigger on the Account object on the before update event that increments a count field. A workflow rule als
Andreyy89

Answer:

The answer is "2"

Explanation:

In the given question, the answer is "2" because if the user is new. so very first, the user creates its account and after creating his account, he will update his account value.

When the user creates its account, the value will be 1, and when he updates its account value. so, the value will be 2, that's why 2 is the correct answer.

4 0
3 years ago
If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
umka21 [38]
64 bit the likely hood of it failing is much less
4 0
3 years ago
In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?
malfutka [58]

Storing music files on a smartphone in order to maximize the number of

songs that can be stored is most appropriate for choosing lossy

compression over lossless compression.

<h3>What is Lossy compression?</h3>

Lossy compression refers to a type of data compression which results in

the file size being small. Most times the quality is reduced as a result of

this .

This gives rise to more space being made available for the storage of more

song files which is why it is most appropriate.

Read more about Lossy compression here brainly.com/question/18806025

7 0
2 years ago
When should you create an outline?
liraira [26]

Answer:custom slide show

Explanation:

5 0
2 years ago
A nursing informatics specialist is preparing an in-service program for staff on healthcare informatics and information technolo
Snezhnost [94]

Answer:

A- information

Explanation:

According to my research on nursing informatics specialists, I can say that based on the information provided within the question the nurse would emphasize information as the primary focus. This is because knowing what healthcare informatics entails as well as having the knowledge of how to use the technology is the most important aspect of the job.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
2 years ago
Other questions:
  • What does ADF means????
    13·2 answers
  • How do i unblock website on my school computer
    7·2 answers
  • Which method of accessing FTP has the most limited capabilities?
    9·2 answers
  • You are purchasing several PC systems that will be used as thin clients in a large organization. Which hardware selection criter
    9·1 answer
  • Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
    7·1 answer
  • (Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)
    6·2 answers
  • What is the importance of effectiveness in communication?
    14·1 answer
  • Write a function check_palindrome that takes a string as an input and within that function determines whether the input string i
    12·1 answer
  • What is the difference between a crosstab query and a subquery?
    11·2 answers
  • Password ____ traverse the network searching for passwords from remote authentication systems.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!