1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
9

How many bytes make up the word panthers

Computers and Technology
1 answer:
Sati [7]3 years ago
6 0
It is saying 8 bytes
You might be interested in
Hello hello . please help me​
adelina 88 [10]

Answer:

#include <iostream>  

using namespace std;  

int main()  {  

 int num, check=0;  

 for(int num = 1; num<=100;num++){

for(int i = 2; i <= num/2; i++)  {

     if(num % i == 0)   {  

         check=1;  

         break;         }     }  

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

 return 0;  

}

Explanation:

This line declares num as integer which represents digits 1 to 100.

A check variable is declared as integer and initialized to 0

<em>  int num, m=0, check=0;   </em>

This for loop iterates from 1 to 100

 for(int num = 1; num<=100;num++){

This iterates from 2 to half of current digit

for(int i = 2; i <= num/2; i++)  {

This checks for possible divisors

     if(num % i == 0)   {  

If found, the check variable is updated to 1

         check=1;  

And the loop is terminated

         break;         }     }  

The following if statement prints the prime numbers

 if (check==0)  {       cout <<num<<" ";     }

 check = 0;

 }

5 0
3 years ago
Read 2 more answers
Which component of the technological system is achieved when an automobiles airbag inflates
Aleonysh [2.5K]
Process is the component achieved.

8 0
3 years ago
Can someone help me with this please
alex41 [277]

Answer:

D

Explanation:

Filters and the Sort feature can be applied in any order. 

4 0
2 years ago
Create a Java program that will store 10 student objects in an ArrayList, ArrayList. A student object consists of the following
Crank

Answer:

Following is given the detailed java program as needed.

Last image displays the output of the program

I hope it will help you!

Explanation:

5 0
3 years ago
How computer viruses spread from one computer to another​
morpeh [17]
Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.
8 0
3 years ago
Other questions:
  • The equation y=2x+1 represents a function true or false
    11·1 answer
  • How old do you have to be to get paid to wave at liberty tax in Abilene tx
    8·2 answers
  • Consider the following two implementations of the same algorithm, each written in a different language.
    11·1 answer
  • For activities with output like below, your output's whitespace (newlines or spaces) must match exactly. See this note. Jump to
    15·1 answer
  • Where is your network strongest? Where is it weakest? How have you developed your network thus far? How has that influenced who
    5·1 answer
  • Question 4 of 5
    5·2 answers
  • Key differences between software and books include all of the following except
    15·2 answers
  • Francis has created a new program. However, Francis used some objects from another program to run methods in the current program
    14·2 answers
  • Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current
    13·1 answer
  • In the mouse properties window you can
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!