1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
5

Given the macro definition and global declarations shown in the image below, provide answers to the following questions:

Computers and Technology
1 answer:
galben [10]3 years ago
4 0

Answer:

A. 243

B. True

C. 0

Explanation:

Macro instruction is a line of coding used in computer programming. The line coding results in one or more coding in computer program and sets variable for using other statements. Macros allows to reuse code. Macro has two parts beginning and end. After the execution of statement of quiz4 x, 4 the macro x will contain 243. When the macro is invoked the statement will result in an error. When the macro codes are executed the edx will contain 0. Edx serve as a macro assembler.

You might be interested in
When you are creating a game you plan to sell online and you need to implement art:
Lilit [14]

Answer:

you can download images that the creator has given permission to use freely.

Explanation:

5 0
3 years ago
Read 2 more answers
_____ laws protect intellectual property.
loris [4]
Copyright laws protect intellectual property.
6 0
3 years ago
Read 2 more answers
Types of Hazards Mitigation Measures
Fynjy0 [20]

Answer:

auto mechanics

Explanation:

keeps dirt and grease off hands

4 0
3 years ago
Read 2 more answers
Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
kotegsom [21]

Answer:

import java.util.Scanner;

public class ANot {

   public static void main(String[] args) {

Scanner in = new Scanner(System.in);

// Prompt user for an integer

       System.out.println("Please enter an Integer");

       int intNum = in.nextInt();

       // Prompt user for an double

       System.out.println("Please enter a double");

       double DoubleNum = in.nextDouble();

       // Prompt user for a character

       System.out.println("Please enter a Character");

       char charNum = in.next().charAt(0);

       // Prompt user for a String

       System.out.println("Please enter a String");

       String StringNum = in.next();

       System.out.println(intNum+" "+DoubleNum+" "+charNum+" "+StringNum);

   }

}

Explanation:

We import the Scanner class in order to receive user input. Then we create four different variables of type int, double,char and String to hold the values entered by the user.

To display the output on a single line, we use string concatenation (using the + operator) to acheive this.

6 0
3 years ago
One way to make a data table stand out on the screen and help bring the viewer’s attention to it is to add a shadow behind the t
olganol [36]
A user can add a shadow to a table on Power Point presentation, b<span>y choosing the Layout tab under Table Tools, clicking on Effects, and selecting Shadow. The shadow can be inner, outer or perspective. The most commonly used is outer shadow.
</span>Adding a shadow behind the table will make the <span>data table to stand out on the screen and help bring the viewer’s attention.
Shades can be added also on text, tables, pictures inserted in the presentation and other object. </span>
7 0
3 years ago
Read 2 more answers
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • Nine and 2 hundred thirty-five thousandths has a decimal
    5·2 answers
  • Define some everyday if else statements you use to determine action. What are the branches of your statement?
    12·1 answer
  • Which of the following resources can be used by an OS to communicate with hardware? (Select 2)
    11·1 answer
  • If you need to provide a storage server with fault tolerance through the use of multiple paths between the server and the actual
    14·1 answer
  • Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
    8·1 answer
  • A small network used for communication between personal computing devices is known as?
    8·1 answer
  • Difference between primary key and foreign key
    12·1 answer
  • Is it possible to see who logged in in youre Microsoft teams account
    11·2 answers
  • A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!