1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddik [55]
3 years ago
14

Explain how to use fortran programming in details

Computers and Technology
1 answer:
Natali [406]3 years ago
6 0

Answer:

1. Write the program you want to write.

2. Compile the program. To do this, type f77 xxxxx.f into the command line. If this gives an error, you probably haven't installed a Fortran compiler like for example gfortran yet.

3. Run the program. The compiler has produced a file called a.out. Run this file by typing ./a.out.

4. Understand what you just wrote.

5. Add your comment. To add a comment that has an entire line on its own, write a c directly into a new line, without the 6 spaces. After that, write your comment. You should leave a space between the c and your comment for better readability, but this isn't required. Note that you have to use a ! instead of a c in Fortran 95 and newer.

To add a comment in the same line as code, add a ! where you want your comment to begin. Again, a space isn't required, but improves readability.

You might be interested in
Enterprise systems help managers and companies improve their performance by enabling them to __________.
Sonbull [250]

Answer: b)seamlessly share real-time data internally among departments and with external business partners.

Explanation: Enterprise system are type of software section that provides the facility of controlling and tracing of the operation in business organizations.They helps in making the business automatic, trading of data in different organization sectors internally and externally as well, reporting etc.

Other options are incorrect because it does not transfers the data using emails,outsourcing the process to vendors and combining data into central hub.Thus, the correct option is option (b).

4 0
3 years ago
What is the recommended secure protocol for voice and video applications? secure real-time transport protocol (srtp) hypertext t
snow_tiger [21]
The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to  to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
8 0
4 years ago
Write a function, named "wait_die_scheduler" that takes a list of actions, and returns a list of actions according to the follow
lidiya [134]

Answer:

See attached picture for complete code.

Explanation:

See attached picture.

4 0
3 years ago
One way to prepare for filing the PROFILE is to:
kozerog [31]
I think I am not sure that it is probably b
8 0
4 years ago
Read 2 more answers
what are the main technologies that have contributed to be growth and commercialization of the Internet
iren [92.7K]

hope it helps have a good day

5 0
2 years ago
Other questions:
  • Explain the difference between general-purpose and specialized applications. Also discuss the common features of application pro
    11·1 answer
  • What is the top folder of the file tree called
    5·2 answers
  • Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
    11·2 answers
  • To complete this quest, answer the following questions in the submission box below. Make x an array going from 0 to 100 by steps
    15·1 answer
  • How do you compare text on different pages of a document?
    14·1 answer
  • A junior administrator is having issues connecting to a router's console port using a TIA/EIA 568B standard cable and a USB seri
    5·1 answer
  • The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called
    12·1 answer
  • Which of the following are disadvantages of networks? Check all of the boxes that apply.
    14·1 answer
  • We love silky. she is very honest join this by using conjunction ​
    11·2 answers
  • At a family reunion, your cousin takes a picture of both of you with her phone, orders a print of it, and mails it to you with a
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!