1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill115 [55]
4 years ago
5

Write a loop that reads positive integers from console input, printing out those values that are even, separating them with spac

es, and that terminates when it reads an integer that is not positive.
Computers and Technology
1 answer:
Vikentia [17]4 years ago
3 0

#include <iostream>

#include <string>

int main(){

int number = 1;

while(number >= 1){

   std::cin >> number;

   if((number % 2) == 0){

       std::cout << number << " ";

       }

   }

   return 0;

}

You might be interested in
Give four example of computer virus​
asambeis [7]

trojan virus allows some one to sneak a bunch of coruppted data or more viruses into a system. a worm is able to access some ones computer and steal information a firebug is used to crash someones computer and spyder is used to scramble some ones work and deleting it

6 0
3 years ago
Emma has decided that she needs to assess the risk and return of buying an extended warranty for her new laptop for school
vazorg [7]

Answer:

then she should buy the one that can last long cause if she buy the one that is bad that could also be assets the risks to buying an extended warrantly for her new laptop for school

4 0
3 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
Which Tab contains the paragraph attributes?
alexgriva [62]

Answer:

b insert

Explanation:

7 0
3 years ago
What does the program 7-zip do for the files on your computer
IrinaK [193]
It condenses and expands files so they move easily over the internet.. You should never remove it.
8 0
4 years ago
Other questions:
  • 1. Think about the various ways in which you have seen hackers portrayed in popular media over the past few years. Are they hero
    11·1 answer
  • An HP PC does not support the HP System Board Configuration tool, and you must use the HP System Board Replacement and System Di
    7·1 answer
  • Where do deleted files go?
    7·2 answers
  • Online retailer Amazon relies heavily on a hierarchy culture to manage its vast and complex shipping processes. ___________ are
    11·1 answer
  • Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 90; th
    8·2 answers
  • Write a function stats that takes an array and the number of elements in the array. Then, it computes and prints the minimum val
    8·1 answer
  • Suppose that the following elements are added in the specified order to an empty binary search tree: Lisa, Bart, Marge, Homer, M
    5·1 answer
  • In which step of web design is storyboarding helpful?
    10·1 answer
  • Create a statement that always returns the names of the three criminals with the highest number of crimes committed.
    15·1 answer
  • A list contains the following items: Antelope, Baboon, Cheetah, Elephant, Giraffe, Hippo, Jackal, Lion, Okapi, Warthog. ​(a)​A b
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!