Prompt the user to input two integers

Assignment Help Basic Computer Science
Reference no: EM13864350

Write a program that uses for loops to perform the following steps:

Prompt the user to input two integers: firstNum and secondNum (firstNum must be less than secondNum)

Output all odd numbers between firstNum and secondNum

Output the sum of all even numbers between firstNum and secondNum

Output the numbers and their squares between 1 and 10

Output the sum of the square of the odd numbers between firstNum and secondNum.

Output all uppercase letters

 

 

Reference no: EM13864350

Questions Cloud

What is an alternative process strategy to the assembly line : Why do you think major auto manufacturers do not build ambulances? What is an alternative process strategy to the assembly line that Wheeled Coach currently uses
The ldap authentication types : If you look at the LDAP Authentication Types, you will find that LDAP specifies three authentication types: (1) No Authentication (2) Basic Authentication (3) Simple Authentication and Security Layer (SASL) When/why would anyone use a "No Authenticat..
Strongest reasons to accept cultural ethical relativism? : What do you think are the strongest reasons to accept Cultural Ethical Relativism?
Develop a series of business process models : Develop a series of Business Process Models, which capture the existing and proposed business processes. The models should follow the BPMN notation shown in the lecture slides.
Prompt the user to input two integers : Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNum (firstNum must be less than secondNum) Output all odd numbers between firstNum and secondNum
Write a control file to enter 2 rows of data into customers : Write a Control file to enter 2 rows of data into customers table using SQL*Loader. Use separate control file (customers.ctl) and data file (customers.dat).
What is the economic value of the everbright : What is the economic value of the EverBright to an average consumer over the course of one year and how large of an increase in dollar sales will be necessary to recoup the incremental increase in advertising expenditures for VitAwake? For WideAwak..
Need to provide a descriptive profile : Need to provide a descriptive profile of what an individual in this user  group would need when interacting with the district's networking infrastructure. Components could include:
Principles of dimensional metrology : Balls of diameters 25 mm and 20 mm were used to measure a taper ring gage.  The large ball protruded mm above the end face of ring gear while the distance of the end face from the top of the 20 mm diameter ball was 40 mm.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Different document processing applications in more detail

First, make a list of as many different word document applications as you can find. •Second, research at least two different document processing applications in more detail. You cannot use Word as one of your choices. List the advantages and disadvan..

  Recognize and explain six basic computer operations

Recognize the six basic computer operations. Describe each operation's role in computer program and indicate whether it is part of program's input component,

  Sbh problem to reconstruct dna sequence from its l-mer

The SBH problem is to reconstruct a DNA sequence from its l-mer composition. Suppose that instead of a single target DNA fragment, we have two target DNA fragments

  Store the quotient in a word-size variable called result

Show how to perform 77 / 3 in the HCS12. Store the quotient in a WORD-size variable called result, and the remainder in a WORD-size variable called remainder.

  Discuss the pros and cons

An organization has a number of tools available when determining how best to address performance issues on their network. The organization can use subnetting or they can use segmentation.

  Research a specific lapse in professional ethics

Research a specific lapse in professional ethics by an IT professional in the last five (5) years. Summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability

  Describe a specific web or mobile application''s purpose

Describe a specific web or mobile application's purpose. How is it used. What changes has it brought about to its users? What are some likely future uses and enhancements. Remember to keep a business focus.

  Explaining health insurance portability-accountability act

Based on your knowledge of IT security management, argue for or against assertions that Epworth system is in compliance with Health Insurance Portability and Accountability Act (HIPAA).

  Create your personal brand and market your skills

Imagine you are looking for a position in your future career (FOR ACCOUNTANT). You know it is important to have your personal brand on social media.  Career Services discusses the use of social media sites such as LinkedInTM to create your personal b..

  Analyze the consequences of experiment done on mice

Group that had been fed had retained this ability, but other group had not. Probable reason that scientists used only mice from same pure-bred strain is so that?

  Paper on on the turing and von neumann models

Write a 2 page research paper (excluding the title page) on the Turing and von Neumann models. Compare and contrast each and discuss which model is better and why

  Modify the payroll program

Modify the Payroll Program so that it uses a class to store and retrieve the employee's name, the hourly rate, and the number of hours worked. Use a constructor to initialize the employee information

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd