1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dvinal [7]
3 years ago
8

Write a function that is named times_ten and accepts a number as an argument. When the function is called, it should return the

value of its argument multiplied by 10.
Computers and Technology
1 answer:
Stells [14]3 years ago
4 0

It changes a little depending on what programming language you're using, but in C you could say

int times_ten (int num) {

    num = num*10;

    return num;

}

Or, in general terms:

Integer Function times_ten (Integer num)

    Set num = num * 10

    Return num

This is all done assuming the number used as an argument is an integer and that you are returning an integer value, not a decimal. The main thing to notice is that since you have to return a value, you must have two things: a return statement, and a type declaration for the function, otherwise you'll get an error.

You might be interested in
Alan is a manager at a company that is implementing new enterprise systems. What function performed in his company would be cons
Gre4nikov [31]

the answer should be A thats what best fits

6 0
3 years ago
Example: An amount of $1,500.00 is deposited in a bank paying an annual interest rate of 4.3%, compounded quarterly. What is the
maw [93]

Answer:

the answer is

Explanation:

3 0
3 years ago
Administrator access initiative brings together people from industry, disability organizations, government, and research labs fr
Mars2501 [29]

Answer:

False.

Explanation:

Web Accessibility Initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.

It is one of the features of the World Wide Web Consortium (W3C) develiped in 1997 and is aimed at developing standards and support materials to assist in understanding and implementing accessibility for users with disabilities.

6 0
3 years ago
Describe how you would create a Java program that prompted the user to correctly enter a username and password. The username is
schepotkina [342]

Answer:

Explanation:

The program in question would create a new Scanner Object which asks the user for the Username first. It would then save this input into a temporary variable and compare it to the actual username in the database. Since the username is not case sensitive, we would use the toLowerCase() method on both the input and the database username so that they match even if the letters are not the same case structure. If both usernames match then we would move on to ask the user for the Password and compare it with the database password for that user. Since this one is case sensitive we would compare as is. Finally, if both Username and Password match we would print "Hello World" otherwise we would print "Login Failed."

3 0
3 years ago
What code do I have to use in my php if i don’t want my $_SESSION[“variablex”] to destroy? But i already have a session_destroy(
Vesnalui [34]

Answer:

See Explanation Below

Explanation:

Follow the steps below.

1. Start Session

2. Assign the session you want to preserve ( $_SESSION['variablex'] ) to a variable

3. Destroy all session (including the one you want, $_SESSION['variablex'])

4. Reassign the contents of the variable you created in (1) above to $_SESSION['variablex'].

The code is as follows (comments explain each line)

<?php

session_start(); // Start session

$variable = $_SESSION['variablex'] ; // assign $_SESSION['variablex'] to $variable

session_destroy(); // Destroy sessions

$_SESSION['variablex'] = $variable; // assign $variable back to $_SESSION['variablex'] to

// You can continue your code (if you have any), here

// End of solution

?>

5 0
3 years ago
Other questions:
  • What file formats can you safely use in a video presentation
    14·1 answer
  • For your biology class, you will be giving a presentation of the findings of a plant growth experiment. Which application is bes
    7·1 answer
  • Thegroup of technologies concerned with the capturing, processing and transmissionof information in the digital electronic form
    9·1 answer
  • A(n) _____ is money paid for work.<br><br> A. raise <br> B. allowance<br> C. wage<br> D. grant
    14·2 answers
  • Give fields descriptive so that you can easily identify them when you view or edit records.
    13·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • When a method returns an array reference, you include ____ with the return type in the method header.
    15·1 answer
  • Ba esti prost?<br> Ba esti nebun?<br> Ce ai?
    5·2 answers
  • A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
    14·1 answer
  • You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The IS
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!