1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
e-lub [12.9K]
3 years ago
15

PLEASE HELP ME !!!!

Computers and Technology
1 answer:
Sedaia [141]3 years ago
3 0

Answer:

Complete the ZipZapZop()

function so that it requests an integer from the user. The function should display a response following this pattern:

• Divisible by 3: zip

• Divisible by 5 zap

• Divisible by 7 zop

Otherwise, just display the number

Note 1 numbers that are divisible by more than one (3, 5, or 7) should contain

all applicable terms.

Notes 2 Note that you are displaying directly from this function, not returning a value to the calling function.

Hint: The number only prints if it is not divisible by ALL of 3,5,or 7

Explanation:

You might be interested in
Suppose there are 10 computers on a network that are configured to share a few printers and a single document folder. The compan
ivanzaharov [21]

Answer:

B- Workgroup model

Explanation:

A workgroup model can be defined as a process which enables system to be peer together in order to access the resources shared like files and printers at the same time.

In work group microsoft operating systems tend to share files, printers, and even Internet connection among them which is why work group is important especially in a place in which their are various computers with limited files and printer or internet connection.

4 0
4 years ago
Rebecca is creating a method for her class, but wants to make sure that a variable in the method satisfies a conditional phrase.
astraxan [27]

Answer:

D. an assertion

From PLATO

6 0
3 years ago
Information systems (is) users have no responsibility to follow security and backup procedures. group of answer choices true fal
Sauron [17]

The statement 'information systems (IS) users have no responsibility to follow security and backup procedures' is false.

Any kind of data that is available on the Internet has to be protected. All information users have the responsibility to follow the security procedures so that an unwanted circumstance does not arise. Hence, the statement above is false.

It is the responsibility of an organization to protect its data. For this reason, everyone, including the information systems (IS) users is entitled to follow security and backup procedures.

One should recognize that all these security and backup procedures are for our own security as data misplaced can be a loss to the whole organization. Security and backup procedures also help to keep data safe from hackers.

To learn more about information systems, click here:

brainly.com/question/25226643

#SPJ4

3 0
2 years ago
Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the g
zepelin [54]

Answer:

Explanation:

The following is written in C++ and asks the user for inputs in both miles/gallon and dollars/gallon and then calculates the gas cost for the requested mileages using the input values

#include <iostream>

#include <iomanip>

using namespace std;

int main () {

   // distance in miles

   float distance1 = 20.0, distance2 = 75.0, distance3 = 500.0;

   float miles_gallon, dollars_gallon;

   cout << "Enter cars miles/gallon: "; cin >> miles_gallon;

   cout << "Enter cars dollars/gallon: "; cin >> dollars_gallon;

   cout << "the gas cost for " << distance1 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance1 / miles_gallon << "$\n";

   cout << "the gas cost for " << distance2 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance2 / miles_gallon << "$\n";

   cout << "the gas cost for " << distance3 << " miles is " << fixed << setprecision(2) << (float) dollars_gallon * distance3 / miles_gallon << "$\n";

   return 0;

}

8 0
3 years ago
Which Annotation tool provides the ability to convert the mouse icon when giving a presentation to better focus the
adell [148]

Answer:

Laser Pointer

Explanation:

5 0
3 years ago
Other questions:
  • In the Remote Access Domain, if private data or confidential data is compromised remotely, you should set automatic blocking for
    5·1 answer
  • Who is the CEO of Quora?
    15·1 answer
  • What acronym describes networked devices that contain microcomputers but are not thought of as computing devices, such as refrig
    9·1 answer
  • Please Help!
    6·2 answers
  • Find the greatest common factor of 48 and 36.​
    6·1 answer
  • Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is run
    9·1 answer
  • How do you repair a USB?
    15·2 answers
  • Consider a system consisting of processes P1 , P2 , ..., Pn , each of which has a unique priority number. Write a monitor that a
    14·1 answer
  • If we need to manage a contiguous range of memory, handling requests to allocate various sized chunks, and later make those chun
    12·1 answer
  • 3. When code tracing, why is it important to iteratively test parts of the program?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!