1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GrogVix [38]
3 years ago
12

Wap to input a number and reserve it using while loop​

Computers and Technology
1 answer:
OlgaM077 [116]3 years ago
3 0
Yes ok I get your questions
You might be interested in
When employees are hired, they agree to only use cell phones during breaks. How would you classify this?
Rasek [7]
Ddddddddddddddddddddddddddddddddddddddddd
7 0
3 years ago
Read 2 more answers
If the audio has no sound:
Mice21 [21]

Answer:

B

Explanation:

the file to be transcribes should have an audio,it maybe a scam,so you have to file a report.

6 0
3 years ago
A team of researchers wants to create a program to analyze the amount of pollution reported in roughly 3,000 counties across the
omeli [17]

The option that is most likely to be a challenge in creating the program is Different counties may organize data in different ways.

<h3>What is Pollution?</h3>

Pollution is known to be a kind of bringing in of harmful materials into an environment.

These harmful things are known as pollutants. Pollutants are known to be natural and artificial that is they are created by human activity, such as trash or runoff produced by factories, etc.

Learn more program from

brainly.com/question/1538272

7 0
2 years ago
Pls help mark brainliest
kozerog [31]

Answer:

I cant answer this.

Explanation:

You need to take another screenshot so we can see the multiple choice.

4 0
3 years ago
In a language JUNGLE is codded as UJNGEL then how will BANDID is codded?​
Misha Larkins [42]

\huge\tt\underline\pink{BANDID\:✒\:ABNDDI\:✅}

<h2><u>Step</u>-<u>by</u>-<u>step</u> <u>explanation</u>:-</h2>

J ⇢ \sf\purple{U}

U ⇢ \sf\purple{J}

N ⇢ \sf\red{N}

G ⇢ \sf\red{G}

L ⇢ \sf\blue{E}

E ⇢ \sf\blue{L}

  • The first two letters \sf\purple{"J"} and \sf\purple{"U"} are interchanged and they take each other's place respectively.
  • The third and fourth letters \sf\red{"N"} and \sf\red{"G"} maintain their position.
  • The fifth and sixth letters \sf\blue{"L"} and \sf\blue{"E"} also take each other's place respectively.

Following the above sequence, we have

B ➵ \sf\purple{A}

A ➵ \sf\purple{B}

N ➵ \sf\red{N}

D ➵ \sf\red{D}

I ➵ \sf\blue{D}

D ➵ \sf\blue{I}

\circ \: \: { \underline{ \boxed{ \sf{ \color{green}{Happy\:learning.}}}}}∘

4 0
3 years ago
Other questions:
  • Two different names that refer to the same data item best defines:
    12·1 answer
  • Information gathered from observing a plant grow 3 cm over a two-week period results in _______.a. inferences. b. variables. c.
    11·1 answer
  • What is a tag in an HTML document?
    5·1 answer
  • Write regular expressions for the following languages:
    5·1 answer
  • Which of the following access control techniques allows the user to feel empowered and able to change security attributes?
    5·1 answer
  • How can migrating to an enterprise platform solution help a business improve employee productivity?
    12·1 answer
  • All programs display a list of all the installed programs​
    9·1 answer
  • A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a use
    15·1 answer
  • (2) Design a program to determine if a student is entitled to an incentive granted upon payment of
    13·1 answer
  • In computer science what are the methods used to protect the information stored by a piece of software called?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!