1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
german
3 years ago
5

Given the macro definition and global declarations shown in the image below, provide answers to the following questions:

Computers and Technology
1 answer:
galben [10]3 years ago
4 0

Answer:

A. 243

B. True

C. 0

Explanation:

Macro instruction is a line of coding used in computer programming. The line coding results in one or more coding in computer program and sets variable for using other statements. Macros allows to reuse code. Macro has two parts beginning and end. After the execution of statement of quiz4 x, 4 the macro x will contain 243. When the macro is invoked the statement will result in an error. When the macro codes are executed the edx will contain 0. Edx serve as a macro assembler.

You might be interested in
How do you optimize a website using JavaScript?
GenaCL600 [577]
You can edit the website (using Wordpress) -if it is your website of course-, and code JavaScript commands into the page that’s going to be uploaded.

Check out my website: www.birdbloggersblog.com

I coded that with HTML.
4 0
3 years ago
Random access iterators are ____ iterators that can randomly process elements of a container.
olga nikolaevna [1]

Answer:

C. Bidirectional

Explanation:

If we want to access elements at an any random offset position then we can use random access iterators.They use the functionality 'as relative to the element they point to' like pointers.Random access iterators are Bidirectional iterators that can randomly process elements,pointer types are also random-access iterators.

6 0
3 years ago
Run the following program which contains a method called findLetter that takes a letter and a text as parameters and uses a loop
Margarita [4]
他們會會覺得自責自責自己好像沒有關係,他們都沒有關係。他們
6 0
3 years ago
Given 3 random numbers.
Mila [183]

Explanation:

I do not know php, but can do in C/Java

8 0
3 years ago
A _____ attack uses deception to fraudulently acquire sensitive personal information by masquerading as an official e-mail.
Elena-2011 [213]
The ans is Phishing.!

3 0
3 years ago
Other questions:
  • Diane wants to maintain a record of grades she scored in the fifth, sixth, and seventh grades. She enters her grades and the tot
    15·2 answers
  • A plan that outlines the steps and timeline for reaching a certain goal is called a(n):
    13·1 answer
  • Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work
    13·2 answers
  • What shows on the web, what is behind the web (source code) and what is placed on the server (database) , is known as web source
    13·1 answer
  • What is data anayltics
    5·1 answer
  • Approximately what percent of desktop PCs are used for work-related purposes?
    13·2 answers
  • . Briefly describe an SQL DML statement for changing existing data in a table.
    5·1 answer
  • Why is Linux widespread in academic environments?
    7·1 answer
  • What is net pay?<br> What is net pay?
    11·2 answers
  • Question # 2
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!