1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
11

Write an algorithm to sum to values

Computers and Technology
1 answer:
Elis [28]3 years ago
5 0

Answer:

There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:

Let a,b be two numbers.

c=a+b;

print(c);

But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:

Let a be the variable where the input numbers are stored.

while(f==1)

{

printf(“Enter number”);

scanf(“Take number into the variable a”);

sum=sum+a;

printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);

scanf(“Take the input into the variable f”);

}

print(Sum)

Explanation:

hi there answer is given mar me as brainliest

You might be interested in
LISTEN I NEED EVERY SINGLE BRAINLY USER TO RE POST THIS THERE IS A USER WHO JUST SAID THEY ARE GOING TO KILL THEMSELVES PLEASE C
Over [174]
WHAT IS THE NAME OF THE BRAINLY USER
7 0
2 years ago
Read 2 more answers
A search engine is giving you too many sites that are not relevant to your topic, how cell phones change culture. Placing quotes
Pie

Answer:

All of the above.

Explanation:

Regards: Your Friendly Study Co-Pilot!

5 0
3 years ago
Read 2 more answers
​Five elements that can prove the genuineness of a user: what you know, what you have, what you are, what you do, and where you
yuradex [85]

Answer: Authentication factor

Explanation: Authentication factor are the factors that describes about the ingenuity or originality of the user .This is the term that tells about the actuality of user that is getting connected with network by the five elemental question .

The question is regarding the possession, inherency, knowledge/information , identity and location.The answers to these question help in finding the authenticated user.

6 0
3 years ago
Read 2 more answers
Which option describes a systematic error in measuring in the following scenario?
katrin [286]

Answer:

D - The patient’s weight is inaccurate due to the calibration of the scale.

Explanation:

if feel like it is but i'm not 100% sure, sorry if not right answer ( also taking the assignment )

7 0
2 years ago
If the VLOOKUP function is used to find an approximate match, what will it return if there is no exact match?
grigory [225]

Answer:

Its C

Explanation:

The largest value that is less then the lookup value

6 0
3 years ago
Other questions:
  • Opportunity cost is the least desirable alternative given up as a result of a decision.
    6·1 answer
  • Which is an example of a student practicing ethical behavior online??
    7·2 answers
  • Car batteries have two terminals which are (blank).
    8·2 answers
  • If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7
    6·1 answer
  • ¿que significa “TTAQMMQMPDATLSPLNDTMGCCLFEQMMPQTEIUMDR” ?
    5·2 answers
  • Scott does not use privacy settings on his social media
    10·2 answers
  • 1. It is one way to attain one's holistic health condition.​
    9·1 answer
  • Which of the following is equivalent to (p&gt;=q)? <br> i) P q iv) !p Where are genius people?:)
    6·1 answer
  • Which unit of binary storage has a size that is processor dependent?.
    15·1 answer
  • What are the main advantages of the d-step tuning of 2023 murano’s xtronic cvt®?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!