1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
10

Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th

e equation into the correct order of operations with one calculation per step. Show the formula for each step, assigning new letters to calculations as necessary. Part A
Part C
Computers and Technology
1 answer:
motikmotik3 years ago
4 0

Answer:

1. G=D+(A+C^2)*E/(D+B)^3

cobegin:

p1: (D+B)

p2: p1^3

p3: C^2

p4: A+ p3

p5: E/p2

p6: p4 * p5

p7: D + p6

   :G

coend

2. Now The value A=2, B=4, C=5, D=6, and E=8

p1: 6+4 =10

p2: p1 ^3= 10^3= 1000

p3: c^2= 5^2 =25

p4: A + p3= 2 +25 =27

p5: 8/1000

p6: 27 *8/1000

p7: D+ P6= 6+ 216/1000

      = 6216/1000

      =6.216

Explanation:

The above, first bracket with power is processed, and then power inside and outside bracket. And rest is according to BODMAS, and one process is solved at a time.

You might be interested in
What is the relationship between interoperability and the other quality attributes highlighted in this book? For example, if two
Lina20 [59]

Answer:

Interoperability is the ability of or degree to which two or more systems usefully exchange information via interfaces in particular context. Interoperability can be defined in two ways which includes the ability to exchange data (syntactic interoperability) and also the ability to correctly interpret the data being exchanged (semantic interoperability).

If two systems failed to exchange information properly, it means they are not clear to interpret and not easy to communicate and get proper information from each other and that might result in a failed communication which is in turn result in security flaw.

Other quality attributes strongly related (at least potentially) to interoperability is Application Programming Interface (API)

API is a software intermediary that allows two applications to communicate to each other and are necessary for systems interoperability.

8 0
4 years ago
Which tab automatically becomes available after inserting a text box? Drawing Tools Insert Text Box Tools Shape Tools
In-s [12.5K]

Answer:

insert text box

Explanation:

6 0
3 years ago
Read 2 more answers
We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
sleet_krkn [62]

Answer:

1, I would not be able to contact anyone, or call for help.

2, Stores like Apple would lose their purpose.

3, Life would be boring and dull.

  • i hope that helped at all.

4 0
2 years ago
Given four inputs: a, b, c & d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsi
Amiraneli [1.4K]

Answer:

z = a.c' + a.b.d' + b.c'.d'

Explanation:

The truth table for this question is provided in the attachment to this question.

N.B - a' = not a!

The rows with output of 1 come from the following relations: 01 > 00, 10 > 00, 10 > 01, 11 > 00, 11 > 01, 11 > 10

This means that the Boolean expression is a sum of all the rows with output of 1.

z = a'bc'd' + ab'c'd' + ab'c'd + abc'd' + abc'd + abcd'

On simplification,

z = bc'd' + ab'c' + ac'd' + ac'd + abc' + abd'

z = ac' + abd' + bc'd'

Hope this helps!

6 0
3 years ago
Give five example of a dedicated device ​
kogti [31]

Common examples are ATMs, POS terminals, and airport ticket vending machines. Cashierless checkout technologies like “Scan and Go,” inventory scanning, corporate-owned work profile devices, self-ordering kiosks, mobile devices, and POS/m POS are some of the most common examples of dedicated devices in use today.

6 0
2 years ago
Read 2 more answers
Other questions:
  • If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?
    10·2 answers
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • Take some time to do some research about small businesses in your area. Select one and using HTML design a simple site that educ
    11·1 answer
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • True/False
    15·1 answer
  • . What type of device is a computer? Where does it use?​
    14·1 answer
  • Cisco Next Generation Intrusion Prevention System (NGIPS) devices include global correlation capabilities that utilize real-worl
    9·1 answer
  • Why is the song Twinkle Twinkle Little Star an example of ternary form?
    10·1 answer
  • Your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?
    15·1 answer
  • While working in a group of two the members are not getting along. You bring the two members together so they can discuss this i
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!