1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
2 years ago
7

write a C++ program that requires the user to enter two-digit positive and negative integers . The program counts the number of

occurrences of each integer . When the user enters a number greater than 100 or less than -100, the program should exit and print out the statistics of how many times each integer between [-9 and +9] occurred as well as how many numbers outside the range of [-9 to +9] occurred. A sample output of the program is given at the end.
Computers and Technology
1 answer:
ValentinkaMS [17]2 years ago
4 0

Answer:

Use GitHub it helps a lot

Explanation:

You might be interested in
The Windows Group Policy feature provides __________ that govern the way Windows operates in enterprise environments. a. a centr
WITCHER [35]

Answer:

a.

Explanation:

The Windows Group Policy feature provides a centralized set of rules that govern the way Windows operates in enterprise environments. The Windows Group Policy is found in every single Microsoft Windows operating system, and fully controls the working environment of user accounts and computer accounts. This feature allows the user to manually make restrictions and changes such as blocking access to certain sections of the Windows control panel or setting a specific website as the home page for every account on the network.

4 0
3 years ago
_________________ ___________________ is an encrypted code that a person, website, or organization attaches to an electronic mes
Blizzard [7]

Answer:

Digital Signature

Explanation:

Digital Signatures are used in electronic messages to verify the sender's ıdentity. It is a online signature and highly secure way of proving identity.

The Signature is <em>encrypted</em> and can be decoded using <em>public-key</em> .

Digital signatures are certificated uniquely from accredited providers, encrypted and can be validated by certificate authorities.

Messages with digital signatures prove that the message sent by the owner of the signature and didn't changed on the way.

4 0
3 years ago
: How does the founder of Wikipedia keep a tight reign on accuracy? HELP PLEZ AT LEAST A PARGRAPH PLES
natita [175]
The truth is that you do not get to just make an account and post. He keeps it steady by having a highly trained group of people go through all the information and make sure it is correct before they let it be posted. They have not, however, changed things that were posted before those people started to work.
5 0
3 years ago
Write a program that has the user input how many classes they are taking this semester and then output how many hours they will
NeTakaya

wait i don't understand: "Write a program that has the user input how many classes they are taking this semester and then output how many hours they will need to study each week."

8 0
3 years ago
Read 2 more answers
How can development in ICT be utilized to speed up the development and integration efforts
valina [46]

Answer:

Research question 1:

How do exposure to and use of ICTs in school affect future employment?

The impact of ICT use in school and student exposure to ICTs, and the nature of use and exposure, on student employability in developing has not been well documented. Tracer studies of the impact of ICTs on further study and employment would be useful, as this could be a useful additional measure of educational quality, beyond standardized testing results.

Research question 2:

What is the impact of ‘computer-literacy’ instruction in schools?

In most circumstances in LDC schools, ICTs are used almost exclusively to provide instruction in “computer literacy’. Emerging research from OECD experience suggests such instruction may not be a productive use of time or resources – is this true in LDCs?

Research question 3:

What is the gender impact of ICTs in education on access, use of, attitudes toward, and learning outcomes?

Studies of the potential differential impact of ICT use by gender on student access to learning in a variety of LDC contexts need to be done.

Research question 4:

How can ICTs be used to present, comment on and discuss student work, and what are the implications of such impact?

The effects of using ICTs to present and discuss student work are not well researched.

Research question 5:

Are some school subjects better suited for ICT integration than others?

Given that access to ICTs in schools is quite limited, it would be useful to know if certain ICT applications are better suited to use in certain school subjects and others and, if so, how ICTs can be utilized to aid teaching and learning in such subjects.

Explanation:

6 0
3 years ago
Other questions:
  • The analog signals that carry analog or digital data comprise composites built from combinations of simple sine waves.
    12·1 answer
  • Give sally sue specific suggestions on how she can improve her powerpoint skills.
    6·1 answer
  • Which type of optical scanner works in a manner similar to a copy machine?
    15·1 answer
  • What is the main feature of chat rooms?
    9·2 answers
  • A computer virus is a program that can copy itself and infect a computer without the permission of the owner. How do you think a
    9·1 answer
  • What methods would you add to make this class declarationvery useful?
    11·2 answers
  • Leroy wants to keep the bride and groom in a picture, but remove the rest of the family. Which photo-editing tool should Leroy u
    14·1 answer
  • Assume variable age = 22, pet = "dog", and pet_name = "Gerald".
    6·1 answer
  • Fictional Corp has a data center that runs multiple internal applications. However, they want to migrate their email to a cloud
    9·1 answer
  • Say true or false
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!