1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Triss [41]
3 years ago
6

Write code that prints: Ready! userNum ... 2 1 Go! Your code should contain a for loop. Print a newline after each number and af

ter each line of text. Ex: If the input is: 3 the output is: Ready! 3 2 1 Go!
Computers and Technology
1 answer:
Vinvika [58]3 years ago
8 0

Answer:

Kindly find the code snippet in the explanation written in kotlin language

Explanation:

fun main(args: Array<String>) {

   var num:Int

   println("Enter a num")

    num= Integer.valueOf(readLine())

   for(i in num downTo 1){

       if(i==num){

           print("Ready!")

           print(" ")

       }

       print(i)

       print(" ")

       if(i==1){

           print(" ")

           print("Go!")

       }

   }

}

This function too can also work

fun numTo(num:Int){

   if (num>0) for(i in num downTo 1) print("$i ")

   println("Go!")

You might be interested in
How can you quickly locate emails with large attachments.
IgorC [24]

To locate emails with large attachments, go to your email and then choose the option of Choose File > Cleanup Tools > Mailbox Cleanup.

Here , one has to Log into their email account and open their inbox and then use the Search Mail bar and type Size to locate or they Set the Find items that are larger than to 9999 and then one has to click Find.

<h3>How do I find emails by attachment size?</h3>

This can also be done for messages that has a size equal to or bigger than 25.

One has to open their message and then they have to right-click on the attachment. You can choose Save As and save to the location of the choice you want.

Learn more about attachments from

brainly.com/question/978078

4 0
2 years ago
true or false: if a comment is posted anonymously, it cannot be considered hate speech or cyber bullying
pickupchik [31]

Answer:

false

Explanation:

Think about it

5 0
3 years ago
Read 2 more answers
Which site had a major influence on the social gaming site Friendster?
Oduvanchick [21]
The answer is, "Ryze".
4 0
3 years ago
Read 2 more answers
Darian is preparing for a presentation about the poor condition of the locker rooms at school. Match each of the key components
Gemiola [76]

Answer:

Purpose - To paurswade the board to change the conditions of the locker room

Topic - Locker room condition

Method - Electronic Slideshow

Audience - School Board

7 0
2 years ago
TCPDump is used by Wireshark to capture packets while Wireshark own function is:
galben [10]

Answer:

a. to provide a graphical user interface (GUI) and several capture filters

Explanation:

TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text

Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.

5 0
3 years ago
Other questions:
  • Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
    15·1 answer
  • Write a program that uses the function isPalindrome given in Example 6-6 (Palindrome). Test your program on the following string
    7·1 answer
  • All of the following are used to fund private schools except ______
    14·2 answers
  • Coal, nuclear and natural gas power plants all transform thermal energy into electricity
    14·2 answers
  • JAVA
    7·1 answer
  • A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What
    6·1 answer
  • Question #7
    10·2 answers
  • Why optical disk is slower than magnetic disk.?​
    9·2 answers
  • Challenge activity 6.1.3 function call with parameters
    5·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!