1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
4 years ago
15

How do you Evaluate an equation doing dry run ? In C++ language whats the order for using the operators like +, -, /, * ? For Ex

ample (2-5+10*3/4)
Computers and Technology
2 answers:
dexar [7]4 years ago
4 0
In most program languages, operator precedence is algebraic. Exponents, multiplication/division, addition/subtraction and I believe all the comparison operations are lowest. The search term would be "operator precedence".

Operators of equal precedence are evaluated left to right.
34kurt4 years ago
3 0
Just as math in, -3+30/4 the variable u use tells the recision
for int it would be
5 wich is wrong (4.5 is the answer)
so u include iostream
create main function , declare the variables and write the equation
You might be interested in
In a digital computer system, the data is transferred between the CPU and the other components
FinnZ [79.3K]

Answer:

The data transmission or information exchange from the CPU to either the computer's peripherals is accomplished via "Computer ports". The further explanation is given below.

Explanation:

To link a display, camera, microphones, or other devices, computer ports have several purposes. The Processor (CPU) also interacts through a bus to peripherals. Several categories of buses you must have got to hear of would be universal servo controller, PCI, or Compulsive-ATA.

  • A peripheral device has always been defined as any auxiliary appliance including a mouse as well as a keyboard, which somehow helps connect to either the PC but instead operates with it.
  • Computer systems were composed of various hardware. This would include the CPU, storage, buses, devices, etc.

So that the above is the right answer to the given scenario.

8 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
Construct a formula in cell D11 to calculate the sales tax amount for transaction 578. Be sure to appropriately reference the tr
Vlada [557]

Answer:

Explanation:

Formulas!D11: =C11*0.0675

4 / 7  (57.1%)

Feedback:

[-2] The formula in cell D11 does not reference the sales tax rate

[-1] The tax rate reference is not absolute

Copy the formula you used in cell D11 down to calculate the sales tax amount for the remaining transactions.

1 / 1  (100.0%)

Feedback:

Construct a formula in cell E11 to calculate the total amount for transaction 578. Be sure to appropriately reference the transaction amount in cell C11 and the sales tax amount in cell D11 so that you can reuse your formula to calculate the total for the remaining transactions.

Formulas!E11: =SUM(C11:D11)

6 / 6  (100.0%)

Feedback:

Copy the formula you used in cell E11 down to calculate the total for the remaining transactions.

2 / 2  (100.0%)

Feedback:

Use the SUM function to calculate the “Grand Total” in for all transactions in cell E24.

Formulas!E24: =SUM(E11:E23)

4 / 4  (100.0%)

7 0
3 years ago
True or false you have no control over who views your social network information
il63 [147K]
  Your answer would be false. That's what you have security settings for.
4 0
4 years ago
Read 2 more answers
Write a method called shifiLeft that takes a 2D array (that could be jagged) as an input and returns the same array with the ele
kumpel [21]

Answer:

Check the explanation

Explanation:

public static void main(String[] args){

     int[][] twoDimenArray = new int[2][];

     //first row has 3 columns

     twoDimenArray[0] = new int[3];

     

     //second row has 4 columns

     twoDimenArray[1] = new int[4];

     int counter = 0;

     //initializing array

     for(int row=0; row < twoDimenArray.length; row++){

   

        for(int col=0; col < twoDimenArray[row].length; col++){

           twoDimenArray[row][col] = counter++;

        }    

     }

     //printing array

     for(int row=0; row < twoDimenArray.length; row++){

        System.out.println();

        for(int col=0; col < twoDimenArray[row].length; col++){

           System.out.print(twoDimenArray[row][col] + " ");

        }    

     }

  }    

}

<u>Output </u>

0 1 2  

3 4 5 6

8 0
4 years ago
Other questions:
  • According to your course, two benefits of a cloud-based system are_ and_
    12·1 answer
  • Check
    15·1 answer
  • Why is outfitting a workplace with video games in a technology development company consiered a strategic use of money
    14·1 answer
  • Match the metric units with these measurements
    8·1 answer
  • Write a C program (doublecopy) that allows a user to extract some part of an existing file (fileSource) and copy it twice to a n
    5·1 answer
  • WILL GIVE BRAINLIEST
    5·2 answers
  • Which statement best describes desktop publishing?
    10·1 answer
  • Describe how operating system use the following security tools: firewall, automatic updating, antivirus software, spyware and ma
    11·1 answer
  • PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
    12·1 answer
  • What is a term commonly used to describe the Python dictionary feature in other programming languages
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!