1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
raketka [301]
4 years ago
13

Write a program that asks you to enter some integers, and press "enter" after each one.

Computers and Technology
1 answer:
Bogdan [553]4 years ago
5 0

Answer:

// here is code in c++.

// headers

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

int num;

cout<<"enter an integer (0 to stop):";

// read the integer

cin>>num;

// read integer until user enter 0

while(num)

{

cout<<"enter an integer (0 to stop):";

cin>>num;

}

//if input is 0 then print "exit"

cout<<"exit"<<endl;

return 0;

}

Explanation:

Declare a variable "num" to read input from user.Read input integer until

user enter 0 as input.When user enter 0 then program will print "exit" and

end the program.

Output:

enter an integer (0 to stop):2

enter an integer (0 to stop):-2

enter an integer (0 to stop):4

enter an integer (0 to stop):10

enter an integer (0 to stop):123

enter an integer (0 to stop): 0

exit  

You might be interested in
a client device on your network is trying to authenticate via radius proxy, but is failing. you check the relevant policy on the
Varvara68 [4.7K]

The issue can be that the IP address of a RADIUS client differs from that of an access client. It could be necessary to modify the policy's IP address.

A device on the internet or a local network can be identified by its IP address, which is a special address. The rules defining the format of data delivered over the internet or a local network are known as "Internet Protocol," or IP.

IP address, which carry location information and make devices reachable for communication, are essentially the identifier that permits information to be exchanged between devices on a network. There must be a means for computers, routers, and webpages to be distinguished on the internet. A method for achieving this is provided by IP addresses, which are crucial to the operation of the internet.

A series of integers separated by periods makes up an IP address. Four numbers are used to represent IP addresses; for instance, 192.158.1.38 might be one such address. The range of each number in the set is 0 to 255. Therefore, the complete IP addressing range is 0.0.0.0 to 255.255.255.255.

To know more about IP address click on the link:

brainly.com/question/18722788

#SPJ4

6 0
1 year ago
Write a statement that declares a prototype for a function add, which has two int parameters and returns an int .
Anarel [89]
Int add( int, int );
4 0
3 years ago
pLZ PLZ PLZ HELP I HAVE SO MANY MISSING ASSINMENTS. why is physical security so important and necessary for both personal users
jeka57 [31]
Physical security is important because a physical attack is perhaps the most fundamental kind of attack. ... Using a floppy drive or CD-ROM drive on a machine that does not support good BIOS security. Damage to or theft of important machine components, especially those that store data. Theft of an entire machine
7 0
3 years ago
The phrase ____ refers to an organization of components that define and regulate the collection, storage, management and use of
Burka [1]

Answer:

A. Database Management System

Explanation:

A Database Management System or DBMS is a set of programs that allow the DB administrator to the information extraction, storage and modification out of a database. It also provides tools to add, erase, modify or even analyze the data within the DB. Some examples of DBMS are MySQL, mongo DB, Ms SQL Server, etc.

3 0
4 years ago
Difference between Hard copy and Soft copy?​
otez555 [7]

Answer: a hard copy is a printed or physical copy of a document, while a soft copy is a virtual or online copy of the document that is stored on your hard drive or computer.

Explanation:

8 0
3 years ago
Other questions:
  • Jane works in the sales department of a service company. She has impressive interpersonal skills and always turns up for work on
    11·2 answers
  • D-H public key exchange Please calculate the key for both Alice and Bob.
    12·1 answer
  • To get revenge on the pizza parlor burning his pizza and not reimbursing him for it, David returned to the pizza parlor after-ho
    9·2 answers
  • What practices will help you avoid sending out e-mail to the wrong person?
    15·1 answer
  • Sheila is using a process of saving files to her desktop and then renaming them. She is
    13·2 answers
  • Which of the following does not illustrate the survey method of choosing a speech topic?
    6·2 answers
  • Budget at completion<br><br> What does this measurement tell you?
    8·1 answer
  • Write a JAVA program containing a method called hasEight(), which takes an int as input and returns true if the number contains
    14·1 answer
  • Not all hardware is connected with wires, some hardware might be connected wirelessly with
    9·1 answer
  • What is a good theme statement for the short Pixar film "bao"?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!