1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
11

Function Integer cube(Integer num) Return num * num * num End Function Write a main module that contains a statement that passes

the value 4 to this function and assigns its return value to the variable result. Write a statement that calls the display module and passes these variables to it.
Computers and Technology
1 answer:
Klio2033 [76]3 years ago
5 0

Answer:

#include <iostream>

using namespace std;

int cube(int num)//function cube..

{

   return num*num*num;

}

int main() {

   int result=cube(4);//result stores the value of cube(4).

   cout<<result;//displaying it to the screen.

return 0;

}

Explanation:

The above code is in C++ language.The function cube is passed with value 4 and the result of it is stored in the variable result of integer type.Then the result is displayed using the cout. Which is used to print the statement to the output screen.

You might be interested in
Which of the following is not true about network design?Group of answer choicesIn designing LAN networks, network designers tend
sergey [27]

Answer:

In designing LAN networks, network designers tend to design err on the side of providing for less capacity than what is currently necessary.

Explanation:

In designing LAN networks, network designers tend to design err on the side of providing for less capacity than what is currently necessary is not true about network design.

8 0
3 years ago
How does making a phone call differ when using: A public phone A cell phone
rosijanka [135]

Answer:

Differ in the quality of their transmission.

Explanation:

For example, when using the public phone box, wired transmission is done not wireless as in cell phones. Public phone box use electronic signals transmitted through a cable network to send voice data which are not very effective for long distance communication.

However, cell phones wirelessly send electromagnetic wave signal to a cell tower close to the caller and then the information is then transmitted to cell tower close to the receiver within a split of a second. This method of communication has much advantages.

7 0
3 years ago
Lập trình web truy vấn csdl và hienr thị ra màn hình danh sách các bản ghi
almond37 [142]

Answer:

ExplanatOverfishing occurs "when more fish are caught than the population can replace through natural reproduction," according to the World Wildlife . Once this occurs, the species is no longer "sustainable." Eighty-seven percent of all the world's fish stocks that we know about are at the "breaking point," according to the Environmental Defense Fund (EDF).

ion:

3 0
3 years ago
Your boss (the IT director) wants to move several internally developed software applications to an alternate environment, suppor
satela [25.4K]

Answer:

A. PaaS

Explanation:

There are various cloud services like PaaS (platform as a service), IaaS (infrastructure as a service), SaaS (software as a service) etc.

The PaaS is a platform based service where online and adaptive environment is available to run software applications on several digital platforms. Unlike SaaS, it does not provide software services but an environment to install and run other applications.

7 0
3 years ago
Barat explains that if you have a cell that is the sales price of a given product, the value of which will change to produce the
Mice21 [21]

Answer Choices:

a.goal cell

b.constraint

c.changing cell

d.absolute cell

Answer:

c.changing cell

4 0
3 years ago
Other questions:
  • Why was the movable type of the printing press such a breakthrough for publishing?
    15·2 answers
  • A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariabl
    11·1 answer
  • Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the databas
    6·1 answer
  • What port in your computer will you use to plug in your camera?
    14·2 answers
  • You run the ipconfig command on your computer, and it reports an IP address of 169.254.75.10 on the Ethernet interface. Which de
    8·1 answer
  • Since the value we want to receive is either true or false, it makes the most sense to use:
    14·1 answer
  • Clicking the ____ opens the insert function dialog box.
    13·1 answer
  • The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resen
    8·1 answer
  • CODEHS- Please help!
    8·1 answer
  • All HTML5 webpages must begin with the HTML element _____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!