1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
3 years ago
14

Write a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less

than 100. end each prompt with newline. ex: for the user input 123, 395, 25, the expected output is: enter a number (<100: enter a number (<100: enter a number (<100: your number < 100 is: 25
Computers and Technology
1 answer:
worty [1.4K]3 years ago
4 0
Here's a solution in plain C:

int num;
do { printf("enter a number (<100)\n"); scanf_s("%d", &num, sizeof(num)); } while (num >= 100);
printf("your number <100 is %d", num);

Note that this solution has flaws. It is unclear what should happen when the user types a negative number or a floating point number. Also it doesn't handle incorrect input (e.g., "aaa") at all.

But you get the idea.
You might be interested in
Which system provides an easier way for people to communicate with a computer than a graphical user interface (GUI)
Marta_Voda [28]
Answer: natural Language Processing

Explanation:

Natural Language Processing: It is a sub field of linguistics which is concerned with the interactions between Human and computer especially how to program computers to process and to understand large amounts of natural language data.
6 0
3 years ago
What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured I
vovangra [49]

Answer:

Show ip interface brief privileged mode command.

Explanation:

A switch is an intermediate network device for transmitting frames in a network. It operates at the Data-link layer of the OSI model. A Cisco switch uses the Cisco operating system for configuration.

There are three main mode in the switch operating system configuration interface, they are, user, privileged and global configuration mode.

The user mode has few commands vthat runs on it, but are not permanent configuration of the switch. The privileged mode is used mainly for verifying settings in the switch. To check for the IP addresses and status of switch ports, the "show ip interface brief" command is issued in the privileged mode.

All configuration in global mode that are saved in the startup configuration is permanent.

6 0
3 years ago
Which monitor will you prefer in your school ; CRT or FPD ?why ?
Serga [27]

Answer:

CRT

Explanation:

because this is very comfortable for me

7 0
3 years ago
Which of the following is often the hardest part of
ankoles [38]

Answer:

Reproducing the problem

Explanation:

I just did this with my teacher

4 0
3 years ago
After fixing the format of her subheadings, she notices that she misspelled the name of one of the famous people she featured in
GREYUIT [131]

Jemina can go to the editing command group and use the find and replace feature in order to correct her mistake in an efficient manner. Thus, the correct option for this question is A.

<h3>What is the Editing command?</h3>

The editing command may be defined as a type of command which is utilized to make corrections or modifications in an existing file. The line editor is a lower form of the ex-editor and is planned for beginners and is launched by the edit command.

By using the MS-DOS text editor also you are capable to edit, explore, construct, and adjust any text file on your computer. By becoming efficient and comfortable with the editor, people may recognize the more complicated features of the other editors as well.

Therefore, the correct option for this question is A.

To learn more about the Editing command, refer to the link:

brainly.com/question/3668326

#SPJ1

7 0
1 year ago
Read 2 more answers
Other questions:
  • What are some examples for Environmental Technology?
    5·2 answers
  • 38. Which of the following best describes why e-mail spoofing is easily executed? a. SMTP lacks an adequate authentication mecha
    15·1 answer
  • Convert 234.43 (base 7) to base 10
    7·1 answer
  • What is the purpose of filters in a database?
    15·1 answer
  • What is the name of the interface that uses graphics as compared to a command-driven interface?
    11·1 answer
  • Let f be the following function: int f(char *s, char *t){char *p1, *p2;for(p1 = s, p2 = t; *p1 != ‘\0’&amp;&amp; *p2 != ‘\0’; p1
    6·1 answer
  • How are special characters added to a Word document? Check all that apply.
    11·2 answers
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • 2. Why do old video games have large pixels and images with jagged edges?
    6·1 answer
  • Pieter is a network administrator for a growing company and has decided to implement Kerberos. He knows that Kerberos uses a tic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!