1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mumz [18]
3 years ago
13

Three variables, x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts th

ese to integers and print the sum of these three integers. However, if any variable has a value that cannot be converted to an integer, print out, the string "bad value(s) in: " followed by the names of the variables that have bad values (separated by spaces, in alphabetically ascending order).
For example, if the values of x, y and z were respectively "3", "9", "2" then the number 14 would be printed; but if the values were "abc", "15", "boo" then the output would be:
bad value(s) in: x z
Computers and Technology
2 answers:
sveta [45]3 years ago
6 0

Answer:

X 5, Y 6, Z 7

Explanation:

Gelneren [198K]3 years ago
3 0
The answer is 45boobg
You might be interested in
Which statement is used to assign value to a variable?
Romashka [77]

Answer:

the "=" sign is used to assign value to a variable. Example:


int number = 25;

You are basically assigning the value '25' to a variable of type 'integer' called 'number'.

Explanation:

3 0
2 years ago
Which of the following Wi-Fi chalking method refers to drawing symbols in public places to advertise open Wi-Fi networks?
dezoksy [38]

Answer War Chalking

Explanation: War chalking is the technique for presenting the WiFi network publicly. This signifies about the WiFi is present but not describes the manner of it , that is whether it is open connection or closed connection.

It can be used by the people in general as well as hackers . Hackers usually tend to attack and hack its security that is present.Hackers then use the WiFi network  is then used for their own work after being hacked.

3 0
3 years ago
Read 2 more answers
Gavin is making a new logo for his business. He uses drawing software to create a unique. Which file format does he use to creat
vekshin1

Answer:

Vector

Explanation:

vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.

8 0
2 years ago
All of the following are computer hardware servicing tools EXCEPT​
andrey2020 [161]

Answer:

Shovel

Explanation:

7 0
2 years ago
You'll apply the concepts of Lesson 1 to create pseudocode and a flowchart for a modular program. The body mass index (BMI) is o
Kobotan [32]

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

  1. //Ask user for height & weight//
  2. "Enter weight (in pounds):"
  3. "Enter height (in inches"
  4. //Calculate the person's (BMI)//
  5. "BMI = weight * (703 / pow(height, 2));"
  6. //Display the person's (BMI)//

<h3>What is a flowchart?</h3>

A flowchart is also referred to as flow diagram and it can be defined as a graphical representation of an algorithm for a work process or workflow.

<h3>What is a pseudocode?</h3>

A pseudocode can be defined as a description of the steps contained in an algorithm, especially through the use of a plain (natural) language.

In this modular program, the pseudocode and a flowchart for the calculation of person's body mass index (BMI) is given by:

  1. //Ask user for height & weight//
  2. "Enter weight (in pounds):"
  3. "Enter height (in inches"
  4. //Calculate the person's (BMI)//
  5. "BMI = weight * (703 / pow(height, 2));"
  6. //Display the person's (BMI)//

Read more on pseudocode here: brainly.com/question/13208346

#SPJ1

8 0
2 years ago
Other questions:
  • 4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think
    5·1 answer
  • In the Microsoft publisher application, words underlined in red are ____.
    6·1 answer
  • A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
    7·2 answers
  • Why do we need to send emails
    12·1 answer
  • A network slows down when a network card is locked in a perpetual mode
    12·2 answers
  • Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores = {10, 20, 3
    13·1 answer
  • What statement best describes entrepreneurship?
    7·2 answers
  • I have no idea which one please help!
    6·2 answers
  • What is the difference between information poor and information rich<br>​
    13·1 answer
  • Terri needs to insert a cover page into her document. Where should she go to access the commands to do so? Insert tab, Objects g
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!