1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
6

What will be the value of i after the C statements at the right have been executed

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
6 0

Answer:

8

Explanation:

By presuming the given codes as below:

  1.    int i = 3;  
  2.    int j = 10;
  3.    
  4.    if((3*i) < j)
  5.        i = i + 2;
  6.    
  7.    i = i+3;

Firstly, we have i equal to 3. When the i is multiplied with 3 and check if it is smaller than j in the if statement (Line 4), it will return true and there i is incremented by two (Line 5). At this point the i = 3 + 2 = 5

Next i is incremented again by three in Line 7. Hence the final value of i = 5 + 3 = 8

You might be interested in
Describe a psychological challenge of space travel that astronauts can face.
Anna11 [10]

Answer:

Loneliness

Explanation:

It is logical that an astronaught could be lonely up in space due to the absence of loved ones.

6 0
3 years ago
Universal Containers are using Salesforce for Order Management and has integrated with an in-house ERP system for order fulfilme
Crazy boy [7]

Answer:

1. The change can be performed in Production, as it is a configuration change.

2. Integration with the ERP system may not function as expected.

Explanation:

3 0
3 years ago
The application window controls include: minimize, maximize, and close<br><br> A) true <br> B) false
Arlecino [84]

Answer:

True

Explanation:

Look at the top right of your computer while having a chrome tab open. You will see a line, a box, and a x. Hover over each and you can see the names.

6 0
3 years ago
100+20000000 please give answer and win iPhone 11 pro​
Eddi Din [679]

Answer:

20000100

Explanation:

8 0
3 years ago
An administrator deploys a basic network intrusion detection (NID) device to block common patterns of attacks. What detection me
shusha [124]

The type of detection method that this basic network intrusion detection (NID) device use is Signature-based.

<h3>What is signature-based detection?</h3>

A Signature-based detection is known to be a term that is often referenced to cybersecurity.

Note that it involves the use of footprints to recognize any form of malware. It is known that have programs, apps, software, etc., often consist of a digital footprint and as such the use of this detection can be able to identify the attack.

Learn more about  network intrusion from

brainly.com/question/26199042

8 0
2 years ago
Other questions:
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • If the processor has 32 address lines in its address bus; i.e. 32-bit address range, what is its address space or range; i.e. wh
    10·1 answer
  • Describe how computer become <br> in the next 35 year
    5·1 answer
  • Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the
    15·1 answer
  • What is the tallest dam in the united states of america?
    14·2 answers
  • Which network component blocks status?
    9·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
  • All the crtl keys on the keyboard
    8·2 answers
  • A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N, what effort is required to lift the weight? Provide
    5·1 answer
  • What is output by the following code?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!