1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
10

1

Computers and Technology
2 answers:
g100num [7]3 years ago
4 0
Have a look at the man page for printf:

man 3 printf
Lerok [7]3 years ago
4 0

Answer:

1.

printf("%lf", outsidetemperature);

2.

printf("%.2lf\n", outsidetemperature);

Explanation:

1.

The command to print is printf.

It has an argument, that is the datatype. When it is double, it is %lf.

So:

printf("%lf", outsidetemperature);

2.

Again printf. If you want m digits in the fraction, you use %.mlf. So for 2 digits is %.2lf. For a new line, you put a \n after the datatype argument. So:

printf("%.2lf\n", outsidetemperature);

You might be interested in
A folder is a collection of related of data is true or false​
masha68 [24]

Answer:

false

Explanation:

may this answer is helpful for you

5 0
3 years ago
Read 2 more answers
What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are
tia_tia [17]

Answer:

Ensuring Consistent Formatting of Values in a Specific Field

Explanation:

6 0
3 years ago
Read 2 more answers
1 point
stealth61 [152]

Answer:

adwawdasdw

Explanation:

4 0
3 years ago
Read 2 more answers
________ can contain stacked images, text, and other elements which collectively comprise a Photoshop file.
emmasim [6.3K]
If you don’t mind can u add the picture it helps me Answer the question better
6 0
2 years ago
What would happen if your computer was infected with the virus or if your network went down?
tatuchka [14]

Your computer will programs more slowly, when you go to an anti-virus software, for some, it will block you from allowing you to access the application. Your information may be stripped from your computer, allowing the infection to take your personal identity and money.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Ad designers use movement in order to
    9·2 answers
  • The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset - the percentage of risk mi
    12·1 answer
  • The factorial of an integer N is the product of the integers between 1 and N, inclusive. Write a while loop that computes the fa
    10·1 answer
  • What are the main types of computer software?
    5·2 answers
  • 1. The best program to present numerical data in would be ____. a. Access c. PowerPoint b. Excel d. Word
    6·1 answer
  • Can someone write this in java? Also, does anyone know how to do Edhesive assignments?
    15·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    11·1 answer
  • 70 point Brainlist to best answer
    15·1 answer
  • What should you do if an online friend asked to meet you after school? <br>ᵖˡˢˢˢˢ...​
    13·2 answers
  • Data is stored on ________ using a laser to either melt the disc material or change the color of embedded dye.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!