1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
2 years ago
6

What will be the value of i after the C statements at the right have been executed

Computers and Technology
1 answer:
guajiro [1.7K]2 years ago
6 0

Answer:

8

Explanation:

By presuming the given codes as below:

  1.    int i = 3;  
  2.    int j = 10;
  3.    
  4.    if((3*i) < j)
  5.        i = i + 2;
  6.    
  7.    i = i+3;

Firstly, we have i equal to 3. When the i is multiplied with 3 and check if it is smaller than j in the if statement (Line 4), it will return true and there i is incremented by two (Line 5). At this point the i = 3 + 2 = 5

Next i is incremented again by three in Line 7. Hence the final value of i = 5 + 3 = 8

You might be interested in
Whats 9+9+9+9x999-86 divided by 874 times 8764
Alexxandr [17]

Answer:

8155.63844394

Explanation:

6 0
3 years ago
Read 2 more answers
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
From an intraindividual perspective, the causes of aggression in intimate relationships:____________.
OLEGan [10]

Answer:

How partners in a relationship differ in a way that would cause them to contribute differently to the aggression that occurs between them.

Explanation:

Aggression in an intimate relationship is a negative response to environmental stimuli of individual. Two types of aggression are unilateral and bilateral aggression.

Aggression in a relationship can be view from different perspective, namely, interpersonal perspective, intra-individual perspective and sociocultural perspective.

3 0
3 years ago
I have a singular monitor that is a TV for my computer. Recently, I took apart my computer and put it back together. When I put
makkiz [27]

your tv should have either a controls are or a setting area there is an option for "game mode" that should work with the HDMI.

4 0
3 years ago
In your opinion, why did Proponents<br>of IPs used IPV6 instead of IPv5​
frutty [35]

Answer:

The following where many reasons why IPv6 was used instead of IPv5 which are the limitation of it's 32 bit address, IPv5 began or used with a different name called Internet streaming, IPv6 provides unlimited addressing, because it comprises of 128 bit.

Explanation:

Solution:

The following reasons why Proponents  of IPs used IPV6 instead of IPv5​ is stated as follows:

  • Due to its limited 32 bit addressing
  • IPv6 offers almost unlimited addressing because of its 128-bit addressing
  • IPv5 started under a different name which is internet stream(ST)
  • ST(Internet streaming) was developed for streaming video and voice
  • ST was developed by Apple, NeXT, and Sun Microsystems
  • ST was effective on specific frequency to carry out communication
5 0
2 years ago
Other questions:
  • Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.
    13·1 answer
  • Consider the cement used for the foundation; the bricks and timber used for the walls; and the shingles used for the roof. All o
    5·1 answer
  • What is the magnitude of the largest positive value you can place in a bool? a char? an int? a float? a double??
    8·1 answer
  • What do we call the distribution and access of illegal copies of digital books??
    9·2 answers
  • Which of the following is NOT contained on the Slide Show toolbar?
    11·2 answers
  • Consider the following statements: struct supplierType { string name; int supplierID; }; struct paintType { supplierType supplie
    13·1 answer
  • Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems developm
    11·1 answer
  • Pride Group of Companies is making tremendous profits in different categories of electronic goods. The group of managers have to
    12·1 answer
  • Explain the importance of understanding plagiarism, copyright, and fair use during a time when some much of your schoolwork is d
    7·1 answer
  • Whats 12/29 divided by 12/34
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!