1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AlekseyPX
3 years ago
10

Write a main method that prompts the user for an integer between 1 & 10 (inclusive). If the user enters an invalid number, p

rompt for another one. When a valid number is entered, call activity with that number as a parameter.
Computers and Technology
1 answer:
stepan [7]3 years ago
5 0

Answer:

int main() {

   int n;

   cout<<"Enter the integer n"<<endl;

   cin>>n;

   if(n<1 || n>10)

   {

       while(n>10 || n<1)//taking input if the number is not within range..

       {

           cout<<"Enter the number again"<<endl;

           cin>>n;

       }

       activity(n);//calling activity with the n..

   }

return 0;

}

Explanation:

Above written is the main function in which a prompting an integer between 1 and 10 if it is not within range then again taking input.Then after that calling activity with n as argument.

You might be interested in
What appears in the document after you have inserted a video?
Nitella [24]

Answer:

text with a hyperlink to the video website

Explanation:

documents do not auto-upload thumbnails or embedded videos for playback, so external links are pasted there

6 0
3 years ago
Read 2 more answers
which feature will configuring a SOHO network in which all ports on the public untrusted network will be forwarded to one workst
Ugo [173]

Answer:

Demilitarized zone (DMZ).

Explanation:

Demilitarized zone is a kind of security assurance scheme used by network administrator to detect network breach even before it gets to the secured network.

The private LAN is protected with a firewall and a DMZ is configured to allow access by untrusted users, on another workstation, which is a duplicate of the companies private local address.

7 0
3 years ago
A cell's address, its position in the workbook, is referred to as a ________________ when it is used in a formula.
Inga [223]

Answer:

A cell's address, its position in the workbook, is referred to as a <u>cell reference</u>  when it is used in a formula.

5 0
2 years ago
____ lets you store your data remotely and access it with any device connected to the internet.
Gre4nikov [31]
Either iCloud or air drop
6 0
4 years ago
Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or
Artyom0805 [142]

Answer:

A. Do not use computer access or the Internet for unprofessional or inappropriate purposes.

7 0
3 years ago
Other questions:
  • Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counse
    6·1 answer
  • Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1
    7·1 answer
  • A manager wants to set up an area that is not on the LAN but not quite on the Internet. This area will house servers that will s
    5·1 answer
  • Forms open in _______, which provides a user-friendly interface for entering data.
    11·1 answer
  • Most people entering the construction industry learn a specific craft through:
    14·2 answers
  • B) If you send me an email, then I will finish my program. If you do not send me an email, then I will go to sleep early. Theref
    10·1 answer
  • Experienced students may serve as mentors if they are at least age 21 and have at least 3 years of post-secondary education. In
    5·1 answer
  • Why is data processing done in computer
    10·1 answer
  • John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running s
    6·1 answer
  • Personal statements School leaver
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!