1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artyom0805 [142]
3 years ago
9

#include <iostream>

Computers and Technology
1 answer:
nikklg [1K]3 years ago
7 0

Answer:

you did not include the "using namespace std; " and the "intmain() "

You might be interested in
How many bits does it take to store a 3-minute song using an audio encoding method that samples at the rate of 40,000 bits/secon
blondinia [14]

Answer:

115200000 bits

Explanation:

Given Data:

Total Time = 3 minute = 3 x 60 sec = 180 sec

Sampling rate = 40,000 bits / sample

Each sample contain bits = 16 bits /sample

Total bits of song = ?

Solution

Total bits of song = Total Time x Sampling rate x Each sample contain bits

                             = 180 sec x 40,000 bits / sec x 16 bits /sample

                             = 115200000 bits

                             =  115200000/8 bits

                             = 14400000 bytes

                             = 144 MB

There are total samples in one second are 40000. Total time of the song is 180 seconds and one sample contains 16 bits. so the total bits in the song are 144 MB.

5 0
3 years ago
Write code for a function with the following prototype: /* Addition that saturates to TMin or TMax */ int saturating_add(int x,
Kazeer [188]

Answer:

See explaination

Explanation:

program code.

/* PRE PROCESSOR DIRECTIVES */

#include<stdio.h>

/* PRE-DEFINED VALUES FOR TMAX AND TMIN */

#define TMax 2147483647

#define TMin (-TMax -1)

/* saturating_add(int,int) METHOD IS CALLED HERE */

int saturating_add(int firstNumber, int secondNumber)

{

/*

FOR BETTER UNDERSTANDING, LETS TAKE TEST CASE,

WHERE firstNumber = 5 AND secondNumber = 10

*/

int w = sizeof(firstNumber) << 3;

/*

sizeof(firstNumber) VALUE IS 4, SO USING BINARY LEFT SHIFT OPERATOR TO THREE PLACES,

WE HAVE NOW VALUE 32, ASSIGNED TO w

*/

/* ADDITION IS CALCULATED => 15 */

int addition = firstNumber + secondNumber;

/*

MASK INTEGER VARIABLE IS TAKEN

mask BIT IS LEFT SHIFTED TO 31 PLACES => 2^31 IS THE NEW VALUE

*/

int mask = 1 << (w - 1);

/* FIRST NUMBER MOST SIGNIFICANT BIT IS CALCULATED BY USING AND OPERATOR */

int msbFirstNumber = firstNumber & mask;

/* SECOND NUMBER MOST SIGNIFICANT BIT IS CALCULATED BY USING AND OPERATOR */

int msbSecondNumber = secondNumber & mask;

/* MOST SIGNIFICANT BIT OF ADDITION IS CALCULATED BY USING AND OPERATOR */

int msbAddition = addition & mask;

/* POSITIVE OVERFLOW IS DETERMINED */

int positiveOverflow = ~msbFirstNumber & ~msbSecondNumber & msbAddition;

/* NEGATIVE OVERFLOW IS DETERMINED */

int negativeOverflow = msbFirstNumber & msbSecondNumber & !msbAddition;

/* THE CORRESPONDING VALUE IS RETURNED AS PER THE SATURATING ADDITION RULES */

(positiveOverflow) && (addition = TMax);

(negativeOverflow) && (addition = TMin);

return addition;

}

/* MAIN FUNCTION STARTS HERE */

int main(){

/* TEST CASE */

int sum = saturating_add(5, 10);

/* DISPLAY THE RESULT OF TEST CASE */

printf("The Sum Is : %d\n\n",sum);

}

7 0
4 years ago
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
A(n) _______________ supplies one of the most critical aspects of docking stations, but in a smaller, more portable format: supp
baherus [9]

Answer:

A Port Replicators.

Explanation:

Port replicators are devices or extension. They are plugged into the laptop's usb port to provide extra ports to connect other external devices needed by the laptop.

Docking stations does the same thing, but the laptop is plugged into the docking station holding the needed devices, and meant for that laptop brand.

7 0
3 years ago
Circuitry can be either basic or ___________.
Sonja [21]
I think it would be A. Ohm's law.
hope this helps.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Wendy Patel is entering college and plans to take the necessary classes to obtain a degree in architecture. Research the program
    12·1 answer
  • A ____________ is a set of commands which can be run by calling it by name.
    11·2 answers
  • .Although SQL is a language, you don’t use it to write applications? (true, false)
    8·1 answer
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • Identify any eight new programming languages and classify them based on their functionality.
    14·2 answers
  • In a Microsoft Office application, what is the area at the bottom of the application screen that contains information about the
    13·1 answer
  • URGENT!!! Which file format is used mainly in the Microsoft Windows operating system?
    15·2 answers
  • What are some things you can do to clean up your digital footprint.
    9·1 answer
  • What is your biggest takeaway on that subject?​
    8·1 answer
  • Try to crack the code:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!