1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zvonat [6]
3 years ago
7

Assume the following variable definitions int a = 5, b = 12; double x = 3.4, z = 9.1. What are the values of the following expre

ssions?
a) x * a.
b) static_cast(x) * static_cast(z).
c) static_cast(x * z).
d) static_cast(b).
Computers and Technology
1 answer:
levacccp [35]3 years ago
4 0

Answer:

a) 17, b) 27, c) 30, d) 12

Explanation:

a) x * a

3.4 * 5 = 17

b) static_cast<int>(x) * static_cast<int>(z)

Casting a value to int makes it an integer. The above one equals int(3.4) * int(9.1) = 3 * 9 = 27

c) static_cast<int>(x * z)

Casting a value to int makes it an integer. The above one equals int(3.4 * 9.1) = int(30.94) = 30

d) static_cast<double>(b)

12

You might be interested in
What is a column in a table
serious [3.7K]

Answer: The columns in a table are the set of facts that we keep track of about that type of object.

Explanation:

5 0
3 years ago
Read 2 more answers
Compare and contrast the TwoFish encryption algorithm with the DES and AES algorithms. In your comparison be sure to compare and
zheka24 [161]

Answer:

The comparison is done based on their basic, principle, plaintext, key size, rounds, rounds name, security and speed. See the attached document.

Explanation:

The the attachment

8 0
3 years ago
How does one build social capital?
iren2701 [21]

Answer:

by building on line presence

Explanation:

If you put yourself out there in multiple social sites you will build a following

3 0
2 years ago
In the SQL environment, a _____________ is a logical group of database objects – such as tables and indexes – that are related t
Paha777 [63]

Answer:Schema

Explanation: A schema is the group that contains objects of databases with views, index, triggers, tables etc features. The specific user can access schema who persist a certain username.The user is considered as the owner of the database and its element.

Schema is usually bound to have only single database.There are some schema that are already present in the system as the in-built schema .E.g.- sys, guest etc.

5 0
3 years ago
When using an online media source, students should ensure the information is
OLEGan [10]
Viable and true. hope this helps!
6 0
3 years ago
Read 2 more answers
Other questions:
  • WHERE WAS THE CHEESEBURGER INVENTED?
    9·1 answer
  • Which statement is used to create a file object that will append data to an existing file? BufferedWriter salesdata =
    7·2 answers
  • Convert the binary number into a hexadecimal number.
    7·1 answer
  • Write a program to convert a fraction to a decimal. Have your program ask for the numerator first, then the denominator. Make su
    10·1 answer
  • What is the Matlab command to create a column vector with 11 equally spaced elements, whose first element is 2 and whose last is
    8·1 answer
  • Mary feels confident managing Google Search campaigns and is interested in extending her marketing reach with the help of Google
    10·1 answer
  • Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
    15·1 answer
  • HI How are you anyways are any of you intreseted in my giveaway
    7·2 answers
  • We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do
    13·1 answer
  • Cybersecurity is defined as the set of techniques to protect the secrecy, integrity, and availability of computer systems and da
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!