1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Travka [436]
3 years ago
5

A bag of biscuit can hold 22 biscuit, and a container can hold 70 bags of biscuit. Write a program that prompts the user to ente

r the total number of biscuits, the number of biscuits in a bag, and the number of biscuit bags in a container. The program then outputs the number of bags and the number of containers to ship the biscuit. Note that each bag must contain the specified number of biscuits, and each container must contain the specified number of bags. If the last bag of biscuit contains less than the number of specified biscuits, you can discard it and output the number of leftover biscuits. Similarly, if the last container contains less than the number of specified bags, you can discard it and output the number of leftover bags
Computers and Technology
2 answers:
Gala2k [10]3 years ago
6 0

Answer:

leftover bags that make turtles sick

Explanation:

Marta_Voda [28]3 years ago
5 0
The answer is left over bags that make turtles sick
You might be interested in
unittttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt
alukav5142 [94]
What the hell is the point of this, just to waist people's time?
5 0
3 years ago
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
3 years ago
The typing area is bordered on the right side by bars in ms word
lidiya [134]

Answer:

Explanation:

PTA NHI

6 0
3 years ago
Required skills,training,education for dentist
AlekseyPX

Answer:

Education-Bachelor's degree prior to admission to dental school; doctoral degree in dental medicine or dental surgery; some dental specializations require completion of a residency

Skills- Communication skills. Dentists must have excellent communication skills, Detail oriented, Dexterity, Leadership skills, Organizational skills, Patience, Physical stamina, Problem-solving skills.

Explanation:

7 0
3 years ago
Submit your description of your interviews.
fomenos

Answer:

what interviews

Explanation:

huh

6 0
3 years ago
Other questions:
  • Write a program that converst the temperature from Celcius to Fahrenheit. The formula is: F (9/5)C+32
    12·2 answers
  • Which of these consoles have 64 bit architecture
    13·1 answer
  • What is my favorite color?<br> Red<br>Orange<br>Yellow<br>Blue <br>Gold<br>Silver
    13·1 answer
  • A certain manager makes the following statement "Our internet company is in business for the money, making profits, and making t
    13·1 answer
  • What is the purpose of a career portfolio?
    6·1 answer
  • Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?
    5·1 answer
  • PLEASE HELP ME! Will report ignorant answers!
    5·1 answer
  • Explain how the organ systems work together to warm up the body on a cold day
    12·2 answers
  • Unscramble thr words <br>1.Nsieg Wiev<br>2.Seeathdat ievw​
    13·2 answers
  • Consider the following method, remDups, which is intended to remove duplicate consecutive elements from nums, an ArrayList of in
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!