1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
6

What will be the value of i after the C statements at the right have been executed

Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
6 0

Answer:

8

Explanation:

By presuming the given codes as below:

  1.    int i = 3;  
  2.    int j = 10;
  3.    
  4.    if((3*i) < j)
  5.        i = i + 2;
  6.    
  7.    i = i+3;

Firstly, we have i equal to 3. When the i is multiplied with 3 and check if it is smaller than j in the if statement (Line 4), it will return true and there i is incremented by two (Line 5). At this point the i = 3 + 2 = 5

Next i is incremented again by three in Line 7. Hence the final value of i = 5 + 3 = 8

You might be interested in
How can i become an ailen?
DIA [1.3K]
Go to a different state as a migrant and then your a alien
8 0
3 years ago
Read 2 more answers
According to the video, what is used to create computer programs?
Lena [83]
Its a or b. znskdbxkdb
8 0
3 years ago
Read 2 more answers
What is network topology? PLZZZ HURRY
Mashcka [7]

Answer:

Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks.

7 0
3 years ago
write a java program using a do while loop to prompt the user to enter a password. The user should be prompted to enter the pass
Alex787 [66]
We can import Scanner from Java.utils.Scanner to pull in text entered in the console.

public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
String password = "";
do {
System.out.print("Enter your password: ");
password = sc.nextLine();
if(!password.equals("pals") {
System.out.println(\nIncorrect Password. Try again.");
}
} while(!password.equals("pals");
3 0
3 years ago
To complete a forensic disk analysis and examination, you need to create a ____.
just olya [345]
<span>To complete a forensic disk analysis and examination, you need to create a </span>report.
8 0
3 years ago
Other questions:
  • Waterpower was first harvested by ancient societies using
    5·1 answer
  • Write a C++ program that searches for anagrams in a dictionary. An anagram is a word obtained by scrambling the letters of some
    5·1 answer
  • What information should be included in the closing paragraph of a thank-you letter? a. Mention skills that were omitted during t
    6·2 answers
  • Technically
    12·1 answer
  • Multiply 1101 and 0110 in binary.
    10·1 answer
  • A ________ is a self-contained program that spreads through a computer network by exploiting security holes in the computers con
    9·1 answer
  • If your microwave oven is a computer, define its Operating System and User Interface.
    12·1 answer
  • All of the following are helpful tips for protecting your digital privacy, except:
    10·2 answers
  • Viruses which activate themselves after a specific time is called
    10·2 answers
  • Determine the following information about each value in a list of positive integers.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!