Select all that apply. Given the following code fragment, which of the things shown below happen when the statement on line 8 executes?
1 int square(int a)
2 {
3 return a * a
4 }
5 int main()
6 {
7 int x = 0;
8 x = square(5);
9 cout << x << endl;
10 return 0;
11 }
The square function is called and the value 5 is passed as an argument.
The square function calculates 5*5 and stores the result, 25, as a temporary value.
The temporary value is copied (assigned) to the variable x.
The temporary value is discarded by the system.

Answers

Answer 1

The square function is called and the value 5 is passed as an argument. This is because the line "x = square(5);" calls the square function and passes the value 5 as an argument to the function.

The square function calculates 5*5 and stores the result, 25, as a temporary value. This is because the square function takes the value passed as an argument, which is 5, and multiplies it by itself using the * operator. The result of this calculation is 25, which is stored as a temporary value.

The temporary value is copied (assigned) to the variable x. This is because the line "x = square(5);" assigns the value returned by the square function, which is 25, to the variable x. This means that the temporary value calculated by the square function is assigned to the variable x.

To know more about function  visit:-

https://brainly.com/question/30721594

#SPJ11


Related Questions

What are your thoughts on the influence of AI on the overall progress of globalization? So far, globalization has been more beneficial to the developing countries than the developed. Do you think that may change in the future with the advances and expansion of AI in global business?

Answers

Answer:

Explanation:

The influence of AI on the overall progress of globalization is significant and multifaceted. AI technologies have the potential to reshape various aspects of global business and societal interactions. Here are a few key points to consider:

1. Automation and Efficiency: AI-driven automation can enhance productivity, optimize processes, and reduce costs for businesses across the globe. This can lead to increased efficiency in production, supply chains, and service delivery, benefiting both developed and developing countries.

2. Access to Information and Knowledge: AI-powered tools and platforms can facilitate the dissemination of information and knowledge on a global scale. This can bridge the knowledge gap and provide learning opportunities to individuals in developing countries, potentially narrowing the gap between developed and developing nations.

3. Economic Disruption and Job Transformation: The expansion of AI in global business may disrupt certain job sectors, particularly those involving repetitive or routine tasks. While this can lead to job displacement, it also creates opportunities for reskilling and upskilling the workforce. Adapting to these changes will be crucial for individuals and countries to ensure they can benefit from the evolving job market.

4. Technological Divide and Access: There is a concern that the advancement of AI could exacerbate the digital divide between developed and developing countries. Access to AI technologies, infrastructure, and resources can vary significantly, posing challenges for countries with limited resources to fully leverage AI's potential. Addressing this divide will be crucial to ensure equitable globalization and avoid further marginalization of certain regions.

5. Ethical Considerations: The ethical implications of AI, including privacy, bias, and accountability, need to be carefully addressed in the global context. International collaboration and regulation can play a significant role in ensuring responsible and inclusive deployment of AI technologies worldwide.

While globalization has historically had varying impacts on developed and developing countries, the future influence of AI on this trend is complex and uncertain. It will depend on how AI is harnessed, the policies and strategies implemented, and the capacity of countries to adapt and leverage AI for their development goals. A proactive and inclusive approach can help mitigate potential risks and maximize the benefits of AI in global business and globalization as a whole.

AI has been changing the face of globalization by its advances and expansion in global business. The influence of AI is expected to continue to shape globalization in the future.

AI and its technologies are becoming increasingly popular in different areas of globalization. These technologies offer cost-effective and efficient solutions that enable businesses to expand across borders. AI-powered business intelligence, predictive analytics, and automation technologies are allowing companies to streamline operations, reduce costs, and make more informed decisions. While AI may initially offer more benefits to developed countries, it is expected that developing countries will begin to adopt AI technologies more extensively as well. AI has the potential to help bridge the gap between developed and developing countries by improving access to information, resources, and opportunities. This will be especially beneficial in the areas of healthcare, education, and infrastructure development.

Know more about globalization, here:

https://brainly.com/question/30331929

#SPJ11

Can anyone tell me what is wrong with this java script. It wont print the results
https://codehs.com/share/id/square-vTwccz/run



function start(){

var num=readInt("Give me a number to square ");

square;


}

//define

function square(num){

var ans=num*num;

println(ans);



}

Answers

In your JavaScript program, there are mainly problems with syntax errors, range errors, and reference errors can be noticed. So, you are required to correct them all in order to execute them properly.

What is a JavaScript program?

A JavaScript program may be defined as a type of computer programming language that significantly enables you to create dynamically updating content, control multimedia, animate images, and pretty much everything else.

There are seven types of JavaScript errors: Syntax error, Reference Error, Type Error, Evaluation Error, range error, URI Error, and Internal Error. If your correct them all with specific indentation, your program would definitely run smoothly and accurately on the computer.

Therefore, in your JavaScript program, there are mainly problems with syntax errors, range errors, and reference errors can be noticed. So, you are required to correct them all in order to execute them properly.

To learn more about JavaScript, refer to the link:

https://brainly.com/question/29846946

#SPJ9

16. Which substance below is not like the others in regards to resistance?
A. plastic
B. rubber
C. glass
D. copper

Answers

Answer:

D. copper

Explanation:

Copper is not like the other substances in regards to resistance. Plastic, rubber, and glass are all insulators, meaning they have high resistance to the flow of electric current. Copper, on the other hand, is a conductor, meaning it has low resistance to the flow of electric current.

Comments File Home Insert Draw Page Layout Formulas Data Review View Help ▼ K7 X✓ fx B A с D E F G H K M N O P 1 Reid Furniture Store Financing 2 In range G9:G115 enter a formula to calculate the

Answers

In range G9:G115, the formula to calculate the monthly payment for a loan in the Reid Furniture Store Financing worksheet is as follows: =PMT(G5/12,G6,-G4)

Here, the PMT function is used to calculate the monthly payment for a loan.

The arguments required for this function are the interest rate per period, the number of periods, and the present value of the loan.

In this case, the arguments are as follows: Interest rate per period = G5/12Number of periods = G6

Present value of the loan = -G4 (since this value is a negative amount)

Therefore, the complete formula is = PMT(G5/12,G6,-G4).

The range G9:G115 is the area where the formula is being entered, and it will show the results for each customer in that range.

Learn more about Microsoft Excel here:

https://brainly.com/question/11154250

#SPJ11

HELP
When differentiating data, the WHAT of the data is:

Answers

Answer:

a source and a target.

Explanation:

In computer science and information theory, data differencing or differential compression is producing a technical description of the difference between two sets of data – a source and a target.

All are database management systems programs except:

a) corel paradox
b) filemaker pro
c) microsoft database
d) spreadsheets​

Answers

Spreadsheets are not database.

A database is a computerised system designed to store large amounts of raw data. ... Databases can then enforce (store and show) the relationship between different records and tables. Spreadsheets cannot do this.

The company generates a lot of revenue and is rapidly growing. They're expecting to hire hundreds of new employees in the next year or so, and you may not be able to scale your operations at the pace you're working.

Answers

Answer:

The most appropriate way to deal with the situation presented above is to acquire more space at the current office site at additional rent beforehand.

Explanation:

The Scaling of a revenue-generating business is a crucial task in which a lot of pre-planning and thinking is required.

In order to scale the business in the next year, the planning of it is to be carried out at the moment and proper necessary arrangements are ensured. These steps could be one from:

Looking for bigger spaces for renting for a full shift of the operationsLooking for a site office for an additional officeAcquiring more space in the current office site.

This process would result in acquiring a bigger place beforehand but in order to mitigate the risk, try to keep the place in view by providing them a bare minimum advance for the additional units.

what is the most popular monitor​

Answers

Probably a television or a radio I guess

Please help me with these definitions!!!!!!

Type 1 Hypervisor

Type 2 Hypervisor

Virtual Box

Virtual Machine

Virtual Machine Escape

Virtual Machine Monitor

Virtual Machine Sprawl

VMWare

Application Cell

Answers

Answer:

1st one . A bare-metal hypervisor (Type 1) is a layer of software we install directly on top of a physical server and its underlying hardware. mainly found in enterprise environments.

2nd. A Type 2 hypervisor, also called a hosted hypervisor, is a virtual machine manager that is installed as a software application on an existing operating system (OS). ... Examples of this type of hypervisor include VMware Fusion, Oracle Virtual Box, Oracle VM for x86, Solaris Zones, Parallels and VMware Workstation.

3rd. VirtualBox is open-source software for virtualizing the x86 computing architecture. It acts as a hypervisor, creating a VM (virtual machine) where the user can run another OS (operating system).

4th.  a virtual machine is an emulation of a computer system. Virtual machines are based on computer architectures and provide functionality of a physical computer. Their implementations may involve specialized hardware, software, or a combination.

hope it helps x

Explanation:

4

plez answer this
how to divide this binary number
step by step
the best answer will get brainliest ​

plez answer this how to divide this binary number step by stepthe best answer will get brainliest

Answers

The dividend is divided by the divisor, and the answer is the quotient.
Compare the divisor to the first digit in the dividend. ...
Write the first digit of the quotient above the last dividend digit you were using in the comparison. ...
Multiply and subtract to find the remainder. ...
Repeat.

Fill in the blank to complete the sentence.
A non-
agreement is a written agreement that limits what a team member can tell other people about a project they are working on.

Answers

Answer:

disclosure

Explanation:

Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.

A team can be defined as a group of people or set of individuals with various skill set, knowledge and experience coming together to work on a project or task in order to successfully achieve a set goal and objective.

This ultimately implies that, a team comprises of individuals, workers or employees having complementary skills, knowledge and experience needed to execute a project or task successfully.

A non-disclosure agreement is a written agreement that limits what a team member can tell other people about a project they are working on.

This ultimately implies that, a non-disclosure agreement defines or specifies the amount of information about a project that the team members are allowed to divulge to non-members. This is to ensure that the aim, goals, objective and effort put invested into a project isn't sabotaged or discredited.

which methods would you use to create a crossover cable

Answers

To make a crossover cable, you will need the materials and tools written below:

Materials:

Ethernet cable (CAT5e or higher)RJ-45 connectors (two of them)

Tools:

Wire cuttersWire stripCrimping toolCable tester

What is a crossover cable?

Begin the process by trimming the Ethernet cable to your preferred size. Ensure that the length of the connecting cable is sufficient to bridge the gap between the devices that require connectivity.

Utilize the wire strips to remove roughly 1.  5 inches (4 cm) of the external insulation from either end of the cable, thus unveiling the internal wires.

Learn more about crossover cable from

https://brainly.com/question/32156015

#SPJ4

a security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain spii. these responsibilities belong to what security domain?

Answers

The responsibilities of ensuring that company servers are configured to securely store, maintain, and retain sensitive personally identifiable information (SPII) align with the security domain known as "Data Security" or "Information Security."

Data Security focuses on safeguarding data from unauthorized access, disclosure, alteration, and destruction throughout its lifecycle.

It involves implementing appropriate controls and measures to protect data confidentiality, integrity, and availability.

In the context of securely storing SPII, a security professional would undertake several key responsibilities within the Data Security domain:

1)Data Classification and Access Control: The security professional would classify SPII based on its sensitivity and define access control policies to restrict unauthorized access.

This includes implementing strong authentication mechanisms, role-based access controls, and encryption to safeguard SPII.

2)Server Hardening: The security professional would ensure that servers storing SPII are hardened, meaning they are configured securely with appropriate security measures.

This includes disabling unnecessary services, applying patches and updates, configuring firewalls, and implementing intrusion detection and prevention systems.

3)Secure Data Transmission: The security professional would employ secure protocols such as SSL/TLS for encrypting data in transit between servers and clients, preventing eavesdropping or interception of SPII during transmission.

4)Backup and Recovery: Implementing robust backup and recovery processes to ensure that SPII is consistently and securely backed up, allowing for the timely restoration of data in the event of data loss or system failures.

5)Data Retention and Destruction: The security professional would establish policies and procedures for retaining SPII based on legal and regulatory requirements.

They would also ensure secure disposal of SPII when it is no longer required, following proper data sanitization techniques.

For more questions on Data Security

https://brainly.com/question/30154171

#SPJ8

Suppose you have a word processing application on your smartphone, your tablet, and your laptop. You are at home, and you need to write a paper for a class. A [_____] would be easiest to use for writing your paper.
the words you can use are
desktop
tablet
smartphone

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct option for the fill-in-blank of this question is desktop.

Because you can easily use the word application using the desktop. You can also use tablet and smartphone for writing a paper on a word processing application.  But you cannot comfortably and easily write the paper as compared to using the desktop for writing the paper. Furthermore, some wordprocessing features are limited in tablets and in smartphones as compared to desktop wordprocessing application.

So a desktop wordprocessor would be easiest to use for writing your paper.

Answer:

It's "Laptop"

Explanation:

Ryan is designing an app that needs to quickly send low quality photos between users. Most smartphones take much higher quality photos than Ryan needs for his app. Which answer best describes the type of compression Ryan should choose and why?
A. Lossless compression since it ensures perfect reconstruction of the photo.
B. Lossy compression since it ensures perfect reconstruction of the photo.
C. Lossless compression since it typically results in smaller data sizes.
D. Lossy compression since it typically results in smaller data sizes.

Answers

Answer:

D. Lossy compression since is typically results in smaller data sizes.

Explanation:

You could use C, but it technically wouldn't work since Ryan wants to design an app that sends low-quality photos. A or B won't work either because perfect reconstruction of the photo is not important.

When you record a macro, you can assign it to run from a button or from the _____.

Keyboard
Home tab
Status Bar
Task Pane

Answers

Answer:

Keyboard

Explanation:

A macro is a tool that when you press a single key bind on your keyboard and or mouse it keeps pressing the button until the time on the macro runs out or you stop it.

If a person record a macro, you would assign it to run from a button or from the Keyboard Home.

What is keyboard?

A keyboard is known to be a tool that is often used in inputting information such as letters, words, etc., into your computer.

Therefore, If a person record a macro, you would give it to run from a button or from the Keyboard Home.

Learn more about Keyboard from

https://brainly.com/question/13380788

#SPJ9

Who created the idea of a general purpose computing machine.

Answers

Answer:

Charles Babbage

Explanation:

1822 - Charles Babbage (1792-1871) designed his first mechanical computer, the original prototype for the Difference Engine. Babbage invented two machines, the Analytical Engine (a general purpose mathematical device) and the Difference Engine.

Create a class called Drive. It should have instance fields miles and gas which are both integers. Another instance field, carType, is a String. The constructor should receive a String which initializes carType. The other two instance fields are both automatically initialized to 1 in the constructor. Create a method called getGas that returns an integer that is the gas data member. The getGas method has no parameters. Write in java. First correct answer will be marked brainliest, i need answer very soon

Answers

public class JavaApplication87 {

   

   public static void main(String[] args) {

       Drive dr = new Drive("Insert type of car");

       System.out.println(dr.carType);

   }

   

}

class Drive{

   int miles;

   int gas;

   String carType;

   public Drive(String ct){

       carType = ct;

       miles = 1;

       gas = 1;

       

   }

   int getGas(){

       return gas;

   }

   

}

I'm pretty sure this is what you're looking for. Best of luck.

Derek, a project manager. is involved in an activity that occurs during the system-level requirements analysis. In which activity is Derek involved? Derek is involved in the activity of providing insights about the design

Answers

Derek is involved in the option C.) work breakdown structure activity of providing insights about the design.

What is work breakdown structure?

A Work Breakdown Structure (WBS) is known to be a kind of an hierarchical outline  or division of the tasks that is known to be needed to complete a  given project.

Note that the WBS “breaks down” is seen as the structuring of any given  project into a way that is said to be manageable in its deliverables.

Note also that the deliverable is sent on a task and as such, Derek is involved in the option C.) work breakdown structure activity of providing insights about the design.

Learn more about work breakdown structure from

https://brainly.com/question/6197566
#SPJ1

Derek, a project manager, needs to create a plan for a software development project. Which approach or document will help him define the tasks required to carry out that project?

A.) tracking application

B.) tracksheet

C.) work breakdown structure

D.) project application

The act of color balancing in film is known as

A:Blue
B:white
C:Black
D:Gray

Answers

The answer is: color White.
B, Really just the most neutral color possible, which in most cases is white.

Invariants The function foo takes an array of ints and perform some computation. void foo(int[] a) { int i-o, co, k-1; int n. a.length; while (i

Answers

Invariants can be described as a condition that is established and maintained after each iteration. Invariants can help improve the efficiency of algorithms and make it easier to write correct code.

The function foo takes an array of ints and performs some computations. Given an array `a` with `n` elements, the function `foo(int[] a)` declares three variables, `i`, `co`, and `k` with initial values of `0`, `0`, and `1` respectively. The function then enters a while loop, the loop condition checks whether the value of `i` is less than `n`. This indicates that the loop will be executed for `n` times and as such, is the invariant for this function.

The computation performed in this loop is to check if the current element in the array, `a[i]`, is equal to `0`. If `a[i]` is equal to `0`, then `co` is incremented by `1` and `k` is multiplied by `2`. At the end of each iteration, the value of `i` is incremented by `1`. Therefore, the invariant for this function is that `i` is less than `n`. The function will terminate when `i` becomes equal to `n`. Here is the code:```

To know more about maintained visit:

https://brainly.com/question/28341570

#SPJ11

The two most popular forms of animation today are Disney animation and Japanese anime. Each style differs from the other in many respects, some of which include the visuals, how the action scenes are created, how the emotional scenes are portrayed, and even the type of audience it draws. Disney is family oriented while anime is more geared toward an adult audience, and that brings different ethical responsibilities on each side. In addition, both animation styles originated in different countries. How did (or does) the government get involved? As all forms of entertainment are highly influential to citizens, the government (or an independent source) may have provided guidelines to follow. Other considerations include how technology improved the quality of animation and how techniques emerged over time that made the production process easier and more efficient.

For this activity, you will write an essay that discusses at least three differences between Disney animation and Japanese anime that cover the following categories:

The ethical influence each has on you
The laws (or lack thereof) regarding the use of technology in animation
The impact that each form of animation has on society
In addition, must explain at least two ways that each animation style has evolved. Your essay should be a minimum of 1,000 words, and spelling, grammar, and punctuation will be factored into your grade. Visual aids, such as images and graphics, are recommended but not required.

Research for your essay will need to combine a review of the unit’s material supplemented with online research.

Submit your essay in a word processing software and ensure it is at least 1,000 words long. Don’t forget to proofread your essay before submitting it to confirm that spelling, grammar, and punctuation are correct. Visual aids, if included, should be embedded in your file, so an application such as Notepad should be avoided for this assignment.

Answers

Answer:

The animation industry has been booming over the past few decades but there have been two animation genres that have stood out from the rest those being the american children's cartoon empire disney and the Japanese industry called anime. One is geared more towards children whilst the other is centered more towards adults. Though these industries may be very different, they both have drawn in a large audience from all around the world. The impacts upon society as a whole are vast and some, unknown.

I wrote a good introductory paragraph hopefully it helps i'm busy now so I can't continue to write your essay hopefully this makes things easier for you

Answer:

this class is so boring hate animation cant find any answers either

Explanation:

Edhisive 4.9 lesson practice what variable is used to track the amount of loops that have been executed

Answers

Your question does not make clear which programming language you are interested in learning about, and the solution to a query about keeping track of loop iterations varies depending on the programming language and type of loop being used.

Define for loops.

A for-loop or for-loop in computer science is a control flow statement that specifies iteration. A for loop works specifically by constantly running a portion of code up until a predetermined condition is met. A header and a body are the two components of a for-loop.

A "For" Loop is employed to repeatedly run a given block of code a certain number of times. We loop from 1 to that number, for instance, if we wish to verify the grades of each student in the class. We utilize a "While" loop when the number of repetitions is unknown in advance.

To learn more about for-loop, use the link given
https://brainly.com/question/19706610
#SPJ1

Take an example of old communication technology and compare it with the new communication technology which is solving the same use case and describe how new communication technology has changed the future of communication

Answers

Any digital gadget that can be used to convey and receive information is referred to as communication technology.

Thus, Software, computer programs, gadgets, and message systems are examples of this technology. Technologies for effective communication are quick, effective, practical, and simple to use. They frequently make it possible for people to connect with one another from anywhere in the world.

Before communication technology, delivering even the most straightforward information took more time and effort than is possible to convey in 140 characters or less.

Information sharing is now simpler than ever because to the integration of technology into many forms of communication. Despite the huge number of devices, programs, and tools used in communication technology.

Thus, Any digital gadget that can be used to convey and receive information is referred to as communication technology.

Learn more about Communication technology, refer to the link:

https://brainly.com/question/1150014

#SPJ4

Auditing B2B eCommerce Systems You are the audit senior at Perrett & Perrin and are conducting the audit of Deam McKellar Walters (DMW) for the year ended 30 June 2021. DMW is a manufacturer of electric cars parts, supplying all the major car brands. DMW buys and sells parts via a B2B hub, an online marketplace where many businesses use a common technology platform to transact. As per the audit plan, the junior auditor has undertaken tests of controls over the B2B system, selecting a sample of electronic transactions to test whether: i. ii. iii. iv. Access to the hub is restricted to only authorised entities as intended; The security infrastructure includes a firewall to act as a barrier between the private hub and the public internet; Programmed controls ensure the order is 'reasonable'; The method of payment or credit worthiness of the customer has been established. Required: a. For each of the above tests, explain the purpose/objective of the control.

Answers

The purpose of the control of the tests conducted by the junior auditor of Deam McKellar Walters (DMW) for the year ended 30 June 2021 are:Access to the hub is restricted to only authorized entities as intended - This control ensures that only authorized entities have access to the hub as intended. Unauthorized entities should not have access to the B2B system.

The objective/purpose of the control of each of the tests conducted by the junior auditor over the B2B eCommerce System of DMW is as follows:

i. Access to the hub is restricted to only authorized entities as intended:The purpose of this control is to ensure that access to the hub is restricted to only authorized entities so that unauthorized persons do not get access to the hub.ii. The security infrastructure includes a firewall to act as a barrier between the private hub and the public internet:The objective of this control is to secure the hub from being accessed by any third party or any unauthorized person by using a firewall which will act as a barrier between the public internet and the private hub.iii. Programmed controls ensure the order is 'reasonable':The objective of this control is to ensure that there are programmed controls which ensure that the orders that have been placed by the customers are reasonable or not. These programmed controls will check and verify the details of the order placed. If the order seems unreasonable or there are any doubts regarding the order then it will not be processed by the system.iv. The method of payment or credit worthiness of the customer has been established:The objective of this control is to ensure that before processing the orders, the method of payment or the creditworthiness of the customer has been established to avoid any kind of fraud or misrepresentation.

Learn more about auditing at

https://brainly.com/question/32781320

#SPJ11

What are 2 characteristics of RAM on a Cisco?

Answers

Two characteristics of RAM on a Cisco are Volatile memory and High-speed access.

Volatile memory:

RAM on a Cisco device is volatile memory, which means that it only stores data when the device is powered on. When the device is powered off, all data stored in RAM is lost.

High-speed access:

RAM on a Cisco device allows for high-speed access to data, which is necessary for the device to operate efficiently. This is because RAM is used to store data that is frequently accessed by the device, such as routing tables and ARP caches.

Overall, these two characteristics make RAM an important component of Cisco devices, as it helps to ensure that they can operate efficiently and quickly.

Learn more about RAM on a Cisco:

brainly.com/question/29590730

#SPJ11

two hosting methods used in cloud environments are are called what? (where data resides) group of answer choices on-premises on a local computer off- premises on a server somewhere

Answers

The two hosting methods used in cloud environments are:

On-premises: This refers to hosting data and applications on a local computer or server that is owned and managed by the organization. This method involves maintaining physical hardware and software infrastructure on-site, which provides greater control and customization but requires more resources and expertise.

Off-premises: This refers to hosting data and applications on a server or servers that are located outside of the organization's premises, typically in a data center owned and operated by a cloud service provider. This method allows organizations to outsource infrastructure management and maintenance to a third-party provider, which can provide greater scalability, reliability, and security but may limit customization and control.

Learn more about hosting here:

brainly.com/question/32075281

#SPJ11

write a loop that reads positive integers from standard input, printing out those values that are greater than 100, each followed by a space, and that terminates when it reads an integer that is not positive. declare any variables that are needed. assume the availability of a variable, stdin, that references a scanner object associated with standard input.

Answers

The code below is in Java.

It uses a do-while loop to get the inputs from the user, checks if they are greater than 100 using if-else structure, and appends them to the result String along with a space

Comments are used to explain the each line.

The output can be seen in the attachment.

//Main.java

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    //Scanner object to be able to get input from the user

    Scanner input = new Scanner(System.in);

   

    // Declaring the variables

    int number;

    String result = "";

   

    //Creating a do-while loop that iterates while number is greater than 0

    //Inside loop, get the number and check if it is greater than 100

    //  If it is, append the number to the result String along with a space

    do{

        number = input.nextInt();

        if(number > 100)

            result += number + " ";

    }while(number > 0);

   

    //Print the result

 System.out.println(result);

}

}

You may check a similar one at:

https://brainly.com/question/15020260

write a loop that reads positive integers from standard input, printing out those values that are greater

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

can someone plz explain how python is related to flowcharts

Answers

Answer:

wha..

Explanation:

Other Questions
Can anybody help me with three processes that are responsible for the loss of the sun's heat in the atmosphere :What can the reader infer about TheGiver based on his own experience as theReciever of memories what is the concentration of a chemical in an oil spill in ppb if 0.060 mg of it is found in 4600 kg of soil? Digital investments need to be viewed from the perspective of:A. the value of the number of appointments in a department.B. the system perspective.C. They cannot really be measured, which is the problem.D. the number of hits on the website. What library is used if we want inputbox and message box Q 1 What is the volume of a rectangular prism with a height of 9 m, a length of 5 m, and a width of 3 m? ____________________________________________________________________ Q 2 What is the volume of the rectangular prism? If the frequency of one allele in a population is 0. 7 in a population with two alleles at a particular locus, what is the frequency of the alternate allele? HELP!The scatter plot shows the heights (in inches) and the shoe sizes of eight men. What is the height of the man whose shoe size is 12? Many influential philosophers of the enlightenment were scientists. How was scientific way of thinking different from how most people thought at the time The tempature,t, in burr town starts at 32 at midnight , when h=0. For the next few hours,the temperature drops 2 degrees every hour. Course Home Extra credit Ex.10 Building Vocabulary Activity: The Skeleton 22 of 33 Match these vocabulary terms to their meanings. Reset Help Tre hole above the eye orbit is the intervertebral disc supraorbital foramen metatarsals ischial tuberosity The articulation formed by the tip of the scapula and the clavicle is called the Each is made of fibrocartlage and serves as a shock absorber for the spine. When moving proximalily from the toes, the set of bones after the phalanges are the The bone marking that makes up the portion of the pelvis you sit on is the Submit Request Answer Next > Provide Feedback 24,767 19 Why are the 4 Agile values important? Mechanical energy is the form ofenergy associated with the_ , _ or _ of an object. If property rights are not well enforced, all of the following are likely to occur except;_________ A. a significant number of people will be willing to risk their funds by investing them in local businesses. B. fewer goods and services will be produced C. economic efficiency will be reduced D. an economy will produce inside its production possibilities frontier. A positively charged ion is known as a(n)A. ANION B. CationC. PositronD. None of the above A cholera outbreak has occurred, and the culprit is contaminated drinking water. Which controllable risk factors might have caused this outbreak? Check all that apply.The unsanitary handling of human waste by nearby waterways.The genetic makeup of individuals reporting cholera-related symptoms.The significant difference in reported cases between males and females.The reduction in accessibility to regions that use filtered bottled water.The lack of access individuals with symptoms have to health clinics. how has he tried to keep you from responding to his story the way he and his father once responded to the one told by moshe the beadle? How were metal coins used in Persia?To purchase more landTo pay soldiersTo pay tavesTo promote trade Find all real and complex roots of the equation z^10 = 9^10 please answer this question