Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Question: Task #1: Counter controlled loop

a). Write a program that will use a counter-controlled loop to display the first 50 numbers

b). Modify the program to prompt the user for a number. Starting with that number, use the counter controlled loop to display 50 numbers beginning with the number the user keyed in.

Task #2: Sentinel Controlled loop

Sentinel controlled loop with numbers

Modify the program to prompt the user to input a list of numbers. Display the number enter to the user .To end entering the list in the input the user must enter -1 as the sentinel value that will terminate the loop.
Sentinel controlled loop with strings

Modify the program to prompt the user to input a list of names. Display the name enter to the user .To end entering the list in the input the user must enter an * as the sentinel value that will terminate the loop.

Task #3: EOF controlled loop

Modify the program in task #1 to write on the first 50 numbers to a file name numbers.txt. Afterwards, open the file as an input-file and use the EOF to control your loop.Display the records read from the file to the screen.After the EOF returns the value of true, the loop will terminate.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92293277

Have any Question?


Related Questions in Computer Engineering

Suppose pointers are 4 bytes long and keys are 12 bytes

Suppose pointers are 4 bytes long, and keys are 12 bytes long. How many keys and pointers will a block of 16,384 bytes have?

Give a recursive algorithm that generates a similar series

Give a recursive algorithm that generates a similar series of coins for changing n cents. Don't use dynamic programming for this problem.

Question critical infrastructures -1discuss cybersecurity

Question: Critical Infrastructures - 1. Discuss cybersecurity policy issues affecting SCADA and ICS systems for Critical Infrastructure services for the public, and compare those issues to the policy issues that affect t ...

Questions 1 what are the four parts of the administrative

Questions: 1. What are the four parts of the administrative simplification requirements of HIPAA? 2. Name three factors used to determine whether you need to comply with HIPAA. 3. What are the three categories of entitie ...

Suppose you have two sorted arrays of n integers x01n and

Suppose you have two sorted arrays of n integers: X0[1..n] and X1[1..n]. Devise and analyze an efficient algorithm for finding the median of all numbers in arrays X0 and X1. Now, suppose you have not two, but three such ...

Suppose you have an object made up of two w-bit integers x

Suppose you have an object made up of two w-bit integers, x and y. Suppose that the hash code for your object is defined by some deterministic function h(x; y) that produces a single w-bit integer. Prove that there exist ...

Request this to be done in jgrasp1 add a method to the

Request this to be done in JGrasp 1. Add a method to the program that calculates the cube of every number between a lower bound and an upper bound that a user inputs (for instance, lower bound 1 and upper bound 9, for be ...

Question discuss in 500 words how you would advise your

Question: Discuss, in 500 words, how you would advise your current employer to use encryption to reduce the vulnerabilities of their data at rest, in use, and in transit (or in motion). Identify at what points you think ...

Question you all work in or know of people who work in

Question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constantly changing. What makes it so difficult to maintain info ...

Why regulated industries should be required to follow

Why regulated industries should be required to follow security standards. Provide 2 examples of industries that would fall under this category.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As