1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
slavikrds [6]
3 years ago
10

Write a program that allows the user to continuously input the value n until a negative number is entered

Computers and Technology
1 answer:
Paul [167]3 years ago
3 0

Answer:

Written in C++

Explanation:

#include <iostream>

using namespace std;

int main()

{

int n;

while(true)

{

cin>>n;

if(n>=0)

continue;

break;

}

return 0;

}

You might be interested in
The numbers, text, or cell references used by the function to return a value are called ____.
Alenkasestr [34]
The numbers, text or cell references used by the function to return a value are called ARGUMENTS. In computers and technology, arguments is referred to as a value that is assigned to something that returns when it is stated in a code.
8 0
4 years ago
Explain connectivity is productivity
Olegator [25]

Answer:

In fact, Quadir coined the phrase "connectivity is productivity" to explain the unique impact of Information Communication Technologies (ICTs), particularly mobile telephones, in improving economic efficiency.

5 0
3 years ago
Match the following terms and definitions.
vovikov84 [41]

Answer:

1. Spaghetti code.

2. Business process management.

3. Procure-to-pay

4. Order-to-cash

5. User tier

6. Firewall

7. Database tier

8.Application tier

9. Three-tier architecture

Explanation:

1.Programming code used to connect stand-alone systems is spaghetti code.

2. Transforming business processes to improve efficiency business process management.

3. Corresponds to the purchasing cycle is called procure to pay.

4. Corresponds to the sales cycle is order-to-cash

5. Consists of front-end client computers and the user interface is user tier.

6. Software programs on a router that monitor network traffic is firewall

7. Comprised of a centralized relational database and an RDBMS is database tier.

8. Consists of servers and application software is application tier.

9. When an enterprise system uses layers of IT components: enterprise database, application, and client computers is three tier architecture.

4 0
4 years ago
Suppose a raptor center has 9 owls and 12 hawks. What percent of these birds are hawks? Round your answer to the nearest whole p
Andrews [41]
Givghjn gujbfuj. Gunghiyvb cvcybv
5 0
4 years ago
Or operator of boolean algebra is denoted by:<br>*<br>+<br>-<br>.​
OlgaM077 [116]

Answer:

or operator is denoted by + sign

7 0
3 years ago
Other questions:
  • What's the full form of SEO?
    12·2 answers
  • Given the following characteristics for a magnetic disk pack with 10 platters yielding 18 recordable surfaces (not using the top
    14·1 answer
  • Which kind of system software tells the computer how to communicate with peripherals, such as a prero
    6·2 answers
  • What are the advantages of using an external style sheet?
    9·1 answer
  • For most people, the most effective way to save is:
    10·1 answer
  • What are procedures that help keep a data base current
    7·2 answers
  • .When one component modifies an internal data item in anothercomponent we call this:
    7·1 answer
  • A misplacement of punctuation or spacing in a command during programming that causes the program to stop running is most
    9·2 answers
  • Group of answer choices When declaring a variable, you also specify the type of its values. Variables cannot be assigned and dec
    7·1 answer
  • ________ was one of the first uses of the Internet
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!