1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lys-0071 [83]
3 years ago
13

Suppose that a program asks a user to enter multiple integers, either positive or negative, to do some calculation. The data ent

ry will stop when the user enters a certain value to indicate the end of the data. What value should the program use as the sentinel?
Computers and Technology
1 answer:
KatRina [158]3 years ago
7 0

Answer:

d) An alphabetic character

You might be interested in
The "Rudolph Rule" is best described by which of the following?
umka21 [38]

Answer:

B) Emphazizing certain points by using color.

Explanation:

I had the same question and I got it right. The answer is this because just like how Rudolph's nose and how it stands out from the others. And so if you pick only the important parts and add color then it will stand out.

7 0
3 years ago
Write a Java program to count the characters in each word in a given sentence?Examples:Input : geeks for geeksOutput :geeks->
dimulka [17.4K]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

   

    Scanner in = new Scanner(System.in);

   

    System.out.print("Enter a sentence: ");

    String sentence = in.nextLine();

   

    String[] words = sentence.split("\\s");

   

    for(String s : words)

     System.out.println(s + " -> " + s.length());

}

}

Explanation:

Ask the user to enter a sentence

Get each word in the sentence using split method and put them in words array

Loop through the words. Print each word and number of characters they have  using the length method in required format

4 0
3 years ago
A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all
disa [49]

Answer:

System image backup

Explanation:

A <em>System Image Backup</em> creates a backup image of your disk volume, including the Windows system files (C:\Windows), your system settings, programs, along with any personal files or documents stored on the disk volume. You can restore your computer from the backup image.

Therefore if a user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all its apps were initially installed, then she needs to have a system image backup

8 0
3 years ago
The area that we can see just after windows is started is subject​
Mumz [18]

Answer:

The area that we can see just after windows is started is desktop or working area.

5 0
2 years ago
Which are characteristics of an effective solution? Choose all that apply. solves the problem in anticipated ways each time resu
salantis [7]

Answer:

A,C,D

Explanation:

7 0
3 years ago
Other questions:
  • Tell me about how to build robots
    11·1 answer
  • Discuss the differences between permanent internal memory and volatile internal memory.
    14·1 answer
  • You have a number of digital pictures you recently took on your smartphone. You would like to share these pictures with all of y
    11·1 answer
  • Which of the following refers to a feature of wikis that allows the restoring of earlier work in the event of a posting error, i
    9·1 answer
  • How does white balancing affect the images recorded by a camera?
    15·1 answer
  • Practice problems on functions. Write C function(s) to carry out the specified tasks. For each problem, also write the suggested
    15·1 answer
  • Is an automatic computer check to ensure that the data entered is sensible and reasonable.It does not check the accuracy of data
    7·1 answer
  • A financially stable person is able to:
    8·1 answer
  • This seems like a good time to ask the basic question, “How’s it going in class?” Feel free to offer constructive feedback about
    6·2 answers
  • It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!