1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
8

Given that an integer variable i and a floating-point variable f have already been declared and given values: Write a statement

in C that displays the values of i and f to standard output in the following format: i=value-of-i f=value-of-f
Two Examples:
Example 1: if the values of i and f were 25 and 12.34 respectively, the output would be: i=25 f=12.34
Example 2: if the values of i and f's value were 703 and 3.14159, (respectively) the output would be: i=703 f=3.14159
Computers and Technology
1 answer:
Wewaii [24]3 years ago
6 0

Answer:

Follows are the given statement to this question:

printf("i=%d f=%f", i, f);//print value

Explanation:

The full code to the given question:

code:

#include <stdio.h>//defining header file

int main()// main method

{

   int i;//declaring integer variable

   float f;//declaring float variable

   i=25; //assign integer value

   f=12.34;//assign float value

   printf("i=%d f=%f", i, f);//print value

   i=703;//assign integer value

   f=3.14159;//assign float value

   printf("\n");//for line break

   printf("i=%d f=%f", i, f);//print value

   return 0;

}

Output:

i=25 f=12.340000

i=703 f=3.141590

In the above-given code, the two variable "i and f" is declared, that holds integer and floating-point value in its respective variable and use the print method, to print "i and f" variables value.  

You might be interested in
Components of an operating system include process,memory,and file management. what is another component of and operating system
kirza4 [7]

Answer:

Wrong it's actually C.

Explanation:

APEX

4 0
2 years ago
Read 2 more answers
___________ is produced by propulsion systems or engines.
Rama09 [41]
I think it’s thrust good luck
8 0
3 years ago
Which port security violation mode does not generate messages or increment the violations counter?
Zanzabum

The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

<h3>What is  offence?</h3>

A deviation from a code of conduct or law is referred to as a violation. When driving a car, going over the posted speed limit is a regular legal violation. Invading someone else's privacy could include reading their journal. failure to uphold a duty or right; breaching the law.

The two types of violations are states and acts. A transgression is a violation of the rules that is less serious than a foul and frequently involves technicalities of the game. A disrespectful or vulgar act: profanation.

Hence, The number of violations is increased. When a secure port is in the error-disabled condition, the shutdown and restrict command can be used to restore it.

To learn more about violation, refer to:

brainly.com/question/1274113

#SPJ4

4 0
2 years ago
Employees often attend trainings and read policies. They endure these, but do not internalize them. What should be your first st
Vlada [557]

Answer:

I would say b but if I'm wrong take the point back

7 0
1 year ago
3. A hyperlink is important because it allows you to ___________. (1 point) click on the link to go directly to a website insert
ikadub [295]
A hyperlink is a link that can direct a person to another website when clicked. So the answer would click on the link to go directly to a website. To insert an image or sound you would use something else. And a hyperlink doesn't restrict a person to just the publisher information. I hope this helps!
3 0
2 years ago
Other questions:
  • The Huntington Boys and Girls Club is conducting a fundraiser by selling chili dinners to go. The price is $7 for an adult meal
    8·1 answer
  • Your school computer library has a network that connects computers and devices within a few small rooms. what type of network do
    7·1 answer
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • What elements are needed in a workstation domain policy regarding use of antivirus and malicious software prevention tools?
    10·1 answer
  • A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu
    5·1 answer
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • Write the following numbers in binary. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25
    11·1 answer
  • You can't cite Wikipedia, what are three ways that you can use it for your research?
    5·1 answer
  • Dion Training has hired you to assess its voucher fulfillment web application on its e-commerce website. The web application rel
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!