1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastovalidia [21]
3 years ago
7

ven int variables k and total that have already been declared, use a while loop to compute the sum of the squares of the first 5

0 positive integers and store this value in total. Thus your code should put 1*1 2*2 3*3 ... 49*49 50*50 into total. Use no variables other than k and total.
Computers and Technology
1 answer:
monitta3 years ago
3 0

Answer:

Following are statement is given below

int  k=1,total=0; // variable declaration

while(k<50) // iterating the while loop

{

   total=total+k*k;//  calculating the square

   k=k+1; // increments the value of k by 1    

}

Explanation:

Following are the description of Statement.

  • Declared a variable "total" and "k" of the "integer " type initialized the total to 0 and "k" to 1.
  • Iterating the while loop for less then 50 .In this loop, we calculating the sum of square of first 50 number in the "total" variable .
  • After that increment the value of "k" variable by 1 to execute the loop less then 50 .

You might be interested in
Please help ASAP!!! :))
Talja [164]

Answer:

You can upgrade the OS by applying SECURITY patches to the server

Explanation:

I can't think of anything else it could be

3 0
3 years ago
What is the difference between a key escrow and a recovery agent? (Choose all that apply.)
Black_prince [1.1K]

Answer:

A and E

Explanation:

A Key Escrow is necessary when a third-party needs access to encrypted data, such as when there is a court order to decrypt the encrypted data. It involve the law giving the order to decrypt the encrypted data.

A Recovery Agent is a person/entity/role allowed to decrypt a user's data in case of emergency, such as when the original key is lost by the user. It is primarily for helping internal users

8 0
3 years ago
This is tech question related to mobile and PC.
love history [14]

I am guessing the bluetooth process is same as usb proccess. So when i transfered a video via usb and took out the usb (for apple phone), there <u>was</u> a file but when i clicked it it said that the phone isn't plugged in

4 0
4 years ago
Which statement demonstrates a conflict of interest in an organization?
lozanna [386]
C hjhjiiiiiiiiiiijjjiiiio
4 0
3 years ago
A software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to
RSB [31]

Answer:

The correct answer for the given question is "Computer virus"

Explanation:

A computer virus is a software program that is installed automatically without user's knowledge and designed to duplicate itself .The main purpose of computer virus is to harm the computer system.

Some of the points regarding computer virus

1.The computer virus contain malicious software Which harm the computer system.

2.It damage the  computer computer system in such away that sometimes users will unable to access some certain functionality of computer system.

5 0
3 years ago
Other questions:
  • A 5.5 g sample of a substance contains only carbon and oxygen. Carbon makes up 35% of the mass of the substance. The rest is mad
    8·1 answer
  • In the following piece of css code what is the property ?
    9·1 answer
  • A(n _______________ is a pre-written formula that is built into excel
    12·1 answer
  • Which of the following subjects is considered technical education
    11·1 answer
  • Which level of education do most peoplebecoming a broadcast analyst obtain?
    13·2 answers
  • To delete a row, you must first
    11·1 answer
  • Join my among us code<br> SHUHZF
    6·2 answers
  • See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
    6·1 answer
  • In this program you will read in the number of seconds and convert it to days, hours, minutes and remaining seconds.
    8·1 answer
  • The advantages and disadvantages of internet​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!