1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
3 years ago
8

Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou

nt of how many numbers were entered.
Sample Run
Enter a number: 1
Enter a number: 41
Enter a number: 36
Enter a number: 25

Sum: 103
Numbers Entered: 4
Hint: If you get an EOF error while running the code you've written, this error likely means you're asking for too many inputs from the user.
Computers and Technology
1 answer:
Eduardwww [97]3 years ago
3 0
In python:
total = 0
i = 0
while total <= 100:
number = int(input("Enter a number: "))
i += 1
total += number
print("Sum: {}".format(total))
print("Numbers Entered: {}".format(i))
You might be interested in
Please refer to the MIPS solution in the question above. How many total instructions are executed during the running of this cod
Digiron [165]

Answer:

MIPS designs are used in SGI's computer product line; in many embedded systems; on Windows CE devices; Cisco routers; and video consoles such as the Nintendo 64 or the Sony PlayStation, PlayStation 2 and PlayStation Portable. Most recently, NASA used one of them on the New Horizons probe1.

Explanation:

The earliest MIPS architectures were 32-bit fsfs (generally 32-bit wide data paths and registers), although later versions were implemented in 64-bit. There are five backward compatible revisions of the MIPS instruction set, called MIPS I, MIPS II, MIPS III, MIPS IV, and MIPS 32/64. In the last of these, MIPS 32/64 Release 2, a record control set is defined to major. Also several "extensions" are available, such as the MIPS-3D, consisting of a simple set of floating point SIMD instructions dedicated to common 3D tasks, the MDMX (MaDMaX) made up of a more extensive set of integer SIMD instructions that use 64-bit floating-point registers, MIPS16 which adds compression to the instruction flow to make programs take up less space (presumably in response to the Thumb compression technology of the ARM architecture) or the recent MIPS MT that adds multithreading functionalities similar to the HyperThreading technology of Intel Pentium 4 processors

3 0
3 years ago
Read 2 more answers
A row in a table _____? for computer class and i’m in the middle of a test!
nydimaria [60]

Answer:

lol

Explanation:lol

7 0
3 years ago
Under what circumstances are composite primary keys appropriate?
guajiro [1.7K]
A composite primary key<span> is a set of several primary </span>keys<span> that, together, uniquely identifies each record.</span>
Primary keys are used as identifiers of composite entities. In this case each primary key combination is allowed only once in the *:* relationship.
Other case where primary keys are used is as identifiers of weak entities, where the weak entity has a strong identifying relationship with the parent entity. 
8 0
4 years ago
The default for automatic replies in outlook is what?
defon

Answer:

The default for automatic replies in outlook is turned off, so the user has to turn it on in order to use it.

Out.look is a program developed by Micro.soft for managing e-mails, being together with G.mail one of the most used worldwide. As in most of these programs, you can configure automatic responses in order to give a quick and generic response to certain types of messages (or even all). Now, this option is disabled by default, so the user must activate it through the configuration of the email box.

6 0
3 years ago
Read 2 more answers
(GAME DESIGN)
Sliva [168]

Answer:

A. When an object is in a specific position on a frame

Explanation:

In the testing phase of a new game, the errors of the programming process are corrected and the gameplay is improved as the game is tested. The objective of correcting serious defects and improving fundamental characteristics not contemplated in the design document, detecting minor failures and profiling the user experience.

8 0
3 years ago
Other questions:
  • What is the IEEE standard for the Wi-Fi Protected Access 2 (WPA2) security protocol?
    6·1 answer
  • It is important to ____ the line in the code editing window in the exact location where you want to insert a code snippet to pro
    10·1 answer
  • zeroIt is a function that takes one argument and returns no value. The function stores the value 0 back into the parameter. x is
    8·1 answer
  • Which is a copyright
    13·2 answers
  • You should always assign the Needs Met rating before assigning the Page Quality rating, T or F ?
    6·2 answers
  • Random Access Memory is tempory computer memory that stores works in progress
    7·1 answer
  • What is a Hard Drive
    13·1 answer
  • Please help thank u!!!!!
    13·2 answers
  • Mention and explain various alignment options​
    9·1 answer
  • What is the difference between information poor and information rich<br>​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!