1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zaharov [31]
3 years ago
13

Given two double variables, best value and second best value, write some code that swaps their values. declare any additional va

riables as necessary.
Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
4 0
As I say to any people requesting programming help on these forums, I always suggest that you include what language you're using in the question, otherwise you may not get the answer you're looking for.

Here's an example in C++, and note that I'm only showing the function, and not the entire code:


static void swap(double& one, double& two)
{
    double temp = one;
    one = two;
    two = temp;
}
You might be interested in
2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
Leto [7]

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

  • ISO 27000 Series (International Organization for Standardization)    
  • ITIL (Information Technology Infrastructure Library)
  • NIST (National Institute of Standards and Technology) and
  • COBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

  1. Identification of the Impact of a security breach on the business;
  2. determine preventive measures and
  3. developing recovery strategies

Cheers!

 

4 0
3 years ago
Which is an example of an operating system? (5 points)
marta [7]

Answer:

Windows

Explanation:

6 0
3 years ago
When passing a list of parameters to a stored procedure by name, you can omit optional parameters by:
amm1812

When passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

<h3>What is optional parameter?</h3>

It should be noted that optional parameter simply means a method that doesn't force pass arguments at calling time.

In this case, when passing a list of parameters to a stored procedure by name, you can omit optional parameters by omitting the parameter name and value from the list.

Learn more about parameter on:

brainly.com/question/13151723

#SPJ12

5 0
2 years ago
The names of the governing body or organizationds that creates rules for information technology and information communication te
IceJOKER [234]

Answer:

Alliance for Telecommunications Industry Solutions

Explanation:

Alliance for Telecommunications Industry Solutions  is the main body that creates rules for information technology and information communication technology.

This agency create solutions to supports the release of new products and services into the communications marketplace. It also act as an agency that standardizes the  wireless and wireline networks activities. It is accredited by the American National Standards Institute (ANSI).

5 0
3 years ago
Which of the following sentences is accurate? a. PDF stands for "Proofreading Direct Files." b. PDF files cannot be edited. c. B
olga_2 [115]

Answer: Option (c) is correct

Explanation:

PDF is portable document format that come in form of file format .It is used for sharing and transmitting between computing and operating systems for viewing and printing in actual page layout. They can be used fro eBooks ,scanned document and text etc.

  • Other options are incorrect because not all business organization use PDF, PDF has the capability of being edited and it stands for "portable document format".
  • Thus, the correct option is option(c)
8 0
3 years ago
Other questions:
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • Briefly outline what LCD screen contain on the inside and why shouldn't it be opened by someone who is not qualified to work wit
    13·2 answers
  • What describes the basic transaction data such as its date, purpose, and amount and includes cash receipts, canceled checks, inv
    13·1 answer
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • Select the correct answer.
    14·2 answers
  • Before performing a Web Recorder task, which two options should the user ensure are setup correctly?
    6·2 answers
  • PLS HELP ILL GIVE BRAINLY) enter the answer) desktop publishing software enables users to create products for print or _________
    12·1 answer
  • What maintains data about various types of objects, events, people, and places?
    10·1 answer
  • PowerPoint Online automatically saves your presentation to what Office Online application?
    10·1 answer
  • Prior to the 1996 NEC, ____ receptacles and cords were permitted. However, now it is mandatory that a separate equipment groundi
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!