1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
15

PLEASE HELP ME !!!!

Computers and Technology
1 answer:
Sedaia [141]3 years ago
3 0

Answer:

Complete the ZipZapZop()

function so that it requests an integer from the user. The function should display a response following this pattern:

• Divisible by 3: zip

• Divisible by 5 zap

• Divisible by 7 zop

Otherwise, just display the number

Note 1 numbers that are divisible by more than one (3, 5, or 7) should contain

all applicable terms.

Notes 2 Note that you are displaying directly from this function, not returning a value to the calling function.

Hint: The number only prints if it is not divisible by ALL of 3,5,or 7

Explanation:

You might be interested in
How do you access the dark web? What are the negatives of doing this?
Inessa05 [86]
The dark web is illegal and therefore people can hack you, obtain your information (identity theft) etc.
6 0
3 years ago
Which file extension would be used to indicate a webpage document?.
mojhsa [17]

Answer:

edge I think

Explanation:

it works the best.

8 0
3 years ago
PLEASSEE HELP ILL GIVE U A BRAINLIEST IF UR RIGHT!!
Nana76 [90]
It is digital signal 
5 0
3 years ago
Read 2 more answers
What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.
Pavel [41]
They leverage smart engineering from the best of the best people to make the company more humanly capable of extraordinary measures
4 0
2 years ago
How can an antivirus protect your device​
Igoryamba
Antivirus software protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account. Antivirus protection scans your files and your incoming email for viruses, and then deletes anything malicious
3 0
2 years ago
Read 2 more answers
Other questions:
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • Type of file can a user send a technician in order to get help remotely, when using remote assistance
    5·1 answer
  • Which of the following is the correct code to link the text "Sunny Days" to the website www.sunnysunshine.com?
    15·1 answer
  • ________ is the standard communications protocol used on most client/server networks.
    9·1 answer
  • 1. You have just upgraded memory on a computer from 4 GB to 8 GB by adding one DIMM. When you first turn on the PC, the memory c
    13·2 answers
  • I love this an this a a good app ❤️❤️❤️​
    5·2 answers
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • Greedy Algorithm Design
    8·1 answer
  • When you get a new sim card do it come with a new number or do you have a activate the phone and get a new number in store ?
    9·1 answer
  • When users connect to the network, they use a basic hardware terminal to access a desktop hosted on a virtualization server. wha
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!