1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
3 years ago
10

Write a while loop that will figure out the factorial of 5 (5!) and print this. It should use two integer variables (i and f) an

d print f at the end:
Computers and Technology
1 answer:
Hoochie [10]3 years ago
7 0

<u>Answer:</u>

<em>void main() </em>

<em>{ </em>

<em>int n, i, fact=1; </em>

<em>printf(""Enter the number\n""); </em>

<em>scanf(""%d"",&n); </em>

<em>i=num </em>

<em>while(i>=1) </em>

<em>{ </em>

<em>fact=fact * i; </em>

<em>i--; </em>

<em>} </em>

<em>printf(""The factorial of given number %d is %d\n"", n, fact); </em>

<em>return 0; </em>

<em>} </em>

<u>Explanation:</u>

This program obtains the number for which the factorial has to be found.

Then run a for loop till the factor of 1 is calculated and inside the for loop the number is multiplied with <em>other numbers in the descending order and finally result is printed. </em>

You might be interested in
What outline feature can the Navigation pane browse the document by?
sattari [20]
It can browse the document by headings.
5 0
3 years ago
Read 2 more answers
If you give someone ______ to your device, they can control it through another phone or computer.
icang [17]

If you give someone <u>Remote access </u>to your device, they can control it through another phone or computer.

<h3>What is  Remote entry?</h3>

An authorized user can use remote access to connect to a computer or network from a different location using a network connection. Users can connect to the systems they require through remote access even if they are physically far away.

Therefore, the dangers to remote access are:

  • There is a risk of device loss or theft due to a lack of physical security safeguards.
  • as the data is transmitted through a public internet, eavesdropping.
  • unapproved access to systems or data, possibly while oblivious to the screen.
  • If someone gets access to the gadget, they could watch and change the data.

Learn more about Remote access from

brainly.com/question/28900477
#SPJ1

5 0
2 years ago
A flat panel detector’s detector element size determines what?
Nastasia [14]

Answer:

A flat panel detector’s detector element size determines Spatial resolution.

7 0
3 years ago
Which of the following is an advantage of batch processing?
alina1380 [7]

Answer:

it can balance computing resources by time

Explanation:

this this is as it involves multiprogramming

8 0
4 years ago
An executive at an online video company wants to look over usage data from the previous month. The company has data from
aleksklad [387]

Answer:

We first need to find out the number of variables, and if it is 3 or less, we can use excel for visualization or else we need to make use of the Microsoft Power BI or Tableau. And here, we have one variable as subscribers in various age groups, and the second variable is the number of hours spent in watching videos. And hence, we have only two variables. And thus, we can make use of the bar chart for visualization, and that is quite enough for visualizing this case. However, remember visualization is done for analyzing, and analyzing is made easy through visualization.

Explanation:

Please check the answer.

7 0
4 years ago
Read 2 more answers
Other questions:
  • You type the word "weather" when you meant to type "whether". When will Microsoft Writer or Microsoft Word flag this as a misspe
    11·2 answers
  • Technological progress has reduced the cost of manufacturing mp3 players. what happens if demand is unchanged?
    9·1 answer
  • (tco 3) what vbscript boolean operator could be used to replace the nested selection structure in this pseudocode? if empmedical
    13·1 answer
  • State two ways a local area network can be used to monitor the work of employees
    11·1 answer
  • Need help with photography
    12·1 answer
  • My study background is business. I am doing a bachelor of business administration. My major course is management information of
    15·1 answer
  • hen a computer user stored data in computer memory, it required 1,024 bytes. How many KB does this represent?
    8·1 answer
  • Use the drop-down menus to answer questions about the options in the Window group. Which command allows a user to view presentat
    6·2 answers
  • How do hand tools,Farm implements and farm equipment differ from one another
    6·1 answer
  • Can someone help on number 8? Plz
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!