1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
10

Write a program that allows the user to continuously input the value n until a negative number is entered

Computers and Technology
1 answer:
Paul [167]3 years ago
3 0

Answer:

Written in C++

Explanation:

#include <iostream>

using namespace std;

int main()

{

int n;

while(true)

{

cin>>n;

if(n>=0)

continue;

break;

}

return 0;

}

You might be interested in
Which is an example of intrinsic motivation?
kkurt [141]

Answer: allowing time to do an after-school activity once studying is done

Explanation: Motivation could be explained as any event, factors or circumstances which increases an individual's willingness, zeal or strength to do something. Motivation could also be inform of incentive or reward which one stands to gain when a certain assignment or mission is accomplished.

However, Intrinsic motivation refers to a class of motivation which are triggered naturally. When a motivation is intrinsic, there is no usually no obvious and or external source of motivation, incentive or reward attached to one's quest of doing something. In the scenario above, all other options except allowing time to do an after-school activity once studying is done have a lucid external incentive which the individual stands or aims to achieve by studying.

5 0
3 years ago
Read 2 more answers
Discuss briefly general-purpose graphicsprimitives that contain 2D graphics library.
Zina [86]

Answer:

  General purpose graphics primitives that contain 2D graphic library as, it is used in graphics processing unit which typically manage computation for computer graphics. Graphic primitives contain basic element such as lines and curves. Modern 2D computer graphic system that operate with primitives which has lines and shapes. All the elements of graphic are formed from primitives.

8 0
3 years ago
The causes of making computer virus​
sasho [114]

Answer:

Damage and chaos. ...

An ego stroke. ...

Monetary or information gain. ...

Stealth. ...

Prevention.

To take control of a computer and use it for specific tasks.

To generate money.

To steal sensitive information (credit card numbers, passwords, personal details, data etc.)

To prove a point, to prove it can be done, to prove ones skill or for revenge purposes.

To cripple a computer or network.

Explanation:

5 0
3 years ago
Read 2 more answers
One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
Sindrei [870]

Answer:

A) hacktivist

Explanation:

According to my research on cyber security attacks, I can say that based on the information provided within the question the form on online vandalism being defined is called hacktivist operations. These are activists who hack into government or organizational systems in order to protest their policies or actions, and by doing so can severely damage their systems.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

8 0
3 years ago
Read 2 more answers
Will give Brainiest and stuff to right answer[s].
Aneli [31]
#22 is 1s and 0s, hope that helps a little bit
6 0
3 years ago
Read 2 more answers
Other questions:
  • Explain how to use fortran programming in details
    14·1 answer
  • What does the Sort feature do with a database
    13·1 answer
  • Change control in application development is a formal process for changing written documentation into online documentation, and
    13·1 answer
  • When working in the middle of a presentation, how do you preview the slide show from the current slide?
    12·1 answer
  • What is ‘validation’?
    5·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    10·1 answer
  • Write c++ program bmi.cpp that asks the user bmi.cpp the weight (in kilograms) and height (in meters).
    12·1 answer
  • How is DATA sent across a Network?
    7·1 answer
  • Login
    11·1 answer
  • A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!