1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
4 years ago
7

2.8 Code Practice: Question 1

Computers and Technology
2 answers:
likoan [24]4 years ago
6 0

Input: A = 2, B = 8, C = 1

Output: Largest number = 8

-BARSIC- [3]4 years ago
4 0

Answer:

The program to this question can be given as:

Program:

#include <stdio.h> //define header file

int main() //define main method.

{

int a1,b1,c1; //define variable

printf("Enter three numbers:\n"); //message

scanf("%d",&a1); //input numbers.

scanf("%d",&b1);//input numbers.

scanf("%d",&c1);//input numbers.

if (a1>b1) //check condition

{

//check condition

if(a1>c1)//inner if block

{

printf("The largest number: %d", a1); //message

}

else  //inner else block

{

printf("The largest number: %d", c1);//message

}

}

else //else block

{

//check condition

if(b1>c1) //inner if block.

{

printf("The largest number: %d", b1);//message

}

else //else block

{

printf("The largest number: %d",c1);//message

}

}

return 0;  //return 0.

}

Output:

Enter three numbers:

22

44

11

The largest number: 44

Explanation:

The description of the above program can be given as:

  • In the C language program firstly we define the header file. Then we define the main function. In the main function, we define three variables that are "a1, b1 and c1". In this variable, we take input from the user.
  • Then we define the conditional statements. In the if block we check if the value of a1 is greater then the value of b1 if this condition is true so we use another condition that if the value of a1 is greater then the value of c1. so, it will print the largest value. If the above condition is not true then it will go to else section.
  • In the else part we check the condition that if the value of b1 is greater then the value of c1. if it is true it will print the largest number value.  
You might be interested in
Some hardware can be added to the computer without having to restart or power down the computer. After a short period of time th
Alja [10]

Answer:

The answer is "Option c"

Explanation:

Plug and Play is a general term that is used to define gadgets operating with a computer network while connected to it. This technology allows the hardware to use automatically by adding it, and other option can be described as follows:

  • In option a, This technology is used in monitoring the commercial vehicles system, which is why it's incorrect.
  • In option b, It is wrong because It is used in Microsoft Windows, which increases the physical security.
  • In option d, It describes the details about the hardware and switches to configure the device, that's why it is incorrect.
5 0
3 years ago
24) The process of ensuring the accuracy of data and their conversion from raw form into classified forms appropriate for analys
WINSTONCH [101]
C) data preparation.
 Is the process of ensuring the accuracy of data and their conversion from raw form into classified forms appropriate for analysus
8 0
3 years ago
What is working with others to find a mutually agreeable outcome?
eduard

Negotiation is one possible answer to this question, I believe, though there are other words which mean similar things that could also suffice. For example, compromise is very similar in meaning, though this specifically means each person is conceding something to find an agreement.

5 0
3 years ago
What should you do with a wireless-capable laptop if you connect a lan cable to it?
marusya05 [52]
A local-area network (LAN<span>)  cable is used in LAN networks to connect several computers or other networking devices.</span>
If you connect a LAN cable to a wireless-capable laptop you should turn the wireless capability off to maximize security, because through the LAN cable viruses can be transmitted, than can harm your computer.

6 0
3 years ago
Read 2 more answers
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Other questions:
  • In 1–2 sentences describe how you would insert a row in a spreadsheet.
    11·1 answer
  • Arrange the following units of storage in descending<br> order. B, TB,KB, GB,MB
    5·1 answer
  • Which of the following is considered a white collar crime?
    13·1 answer
  • What will the following segment of code output if 11 is entered at the keyboard? int number; cin &gt;&gt; number; if (number &gt
    12·1 answer
  • You are a network consultant who has been asked to attend an initial meeting with the executive management team of ElectroMyCycl
    10·1 answer
  • Is it possible to have a deadlock involving only oneprocess? Explain your answer.
    11·1 answer
  • What size segment will be allocated for a 39 KB request on a system using the Buddy system for kernel memory allocation?A) 42 KB
    11·1 answer
  • Tina has taken the time to modify font sizes and colors in a text box and would like to duplicate those settings on other text b
    12·2 answers
  • bailey reads wikis at the beginning of his research project to get his bearings on the topic. he switches to peer-reviewed journ
    10·1 answer
  • True or False: Cookies placed on a visitor's browser can include enough information to instruct an ad network which types of pro
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!