1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
11

Function Integer cube(Integer num) Return num * num * num End Function Write a main module that contains a statement that passes

the value 4 to this function and assigns its return value to the variable result. Write a statement that calls the display module and passes these variables to it.
Computers and Technology
1 answer:
Klio2033 [76]3 years ago
5 0

Answer:

#include <iostream>

using namespace std;

int cube(int num)//function cube..

{

   return num*num*num;

}

int main() {

   int result=cube(4);//result stores the value of cube(4).

   cout<<result;//displaying it to the screen.

return 0;

}

Explanation:

The above code is in C++ language.The function cube is passed with value 4 and the result of it is stored in the variable result of integer type.Then the result is displayed using the cout. Which is used to print the statement to the output screen.

You might be interested in
Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
Natasha_Volkova [10]

Answer:

A zero-day attack.

Explanation:

A Zero-day vulnerability is a computer-software vulnerability that is unknown to, or unaddressed by, the security community or software developer or even the vendor of the target software. Until the vulnerability is mitigated, hackers can exploit it to adversely affect computer programs, data, additional computers or a network.

An exploit directed at a software with zero-day vulnerability & exploiting this vulnerability is called a zero-day exploit, or zero-day attack.

3 0
3 years ago
Place the steps in order for creating a Custom Search Folder in Outlook 2016.
TEA [102]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct order for creating Custom Search Folder in Outlook 2016 is given below:

  1. Click the Folder tab
  2. Click the New Search  Folder
  3. Open the Custom Search
  4. Choose your criteria and  
  5. Select folder in pane to
  6. Click ok to execute the search.

5 0
3 years ago
Read 2 more answers
What college degrees did Steve Wozniak earn?
kap26 [50]
<span>University of California, Berkeley _ comp sci
De Anza College, _ comp sci</span>
7 0
3 years ago
How do you properly turn off a computer?
Ugo [173]

Answer:

with the power button or do the sleep or shut down

and by the type of computer

Explanation:

sry if its wrong

have a good day:)

-XxMissNobodyxX

7 0
2 years ago
Read 2 more answers
11. Explain different types of program control with suitable flow chart.<br> N
melamori03 [73]

hi

Counting a sequence of statements without any decisions or branches as one control structure (as many computer scientists do),the if, if-else, and if-else-if ladders as one control structure,the three types of loops (while, do-while, and for) as three different control structures,the break and continue statements, in the context of loops, as one more (although this can be debatable),the switch/case control structure as one,the call/return mechanism as one,the ability to specify and call a callback function as one,the goto/label as one,and the setjmp/longjmp non-local goto as one,

5 0
2 years ago
Other questions:
  • Which one of the following features can control left and right indents using markers?
    5·2 answers
  • Which process is used to protect transmitted data in a vpn?
    12·1 answer
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    10·1 answer
  • Hugh is giving an informative speech about U.S. Senate election campaigns. Which thesis statement do you recommend he use?
    8·1 answer
  • In the lecture, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why do you
    10·1 answer
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • You try to enter your name into a cell that accepts a numeric value. What error would you receive? A. #NAME B. #VALUE C. #REF D.
    14·2 answers
  • Before posting a picture online, make sure to
    7·1 answer
  • Am I correct? Please help
    7·1 answer
  • #Question 4: #Use a variable to represent the name of a food. You are then going to print this variable four times. Before you d
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!