1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
13

True or False? In a C++ floating-point constant, a decimal point is not required if exponential (E) notation is used

Computers and Technology
1 answer:
Viktor [21]3 years ago
3 0

Answer:

The answer is "True".

Explanation:

The floating-point constant often known as a decimal number, which represents a specific number that was signed the real number contains an integer component, a decimal portion, and an exponent.

  • It shows inviolable float values, that apply to specified values, the value may not modify the program and is called literals.
  • It is also known as the basic data types separated into an integer, float, characters, strings and boolean values, that's why this statement is true.
You might be interested in
You manage a small LAN for a branch office. The branch office has three file servers and few client workstations. You want to us
lana66690 [7]

You manage small LAN for a branch office. The branch office has three file servers and few client workstations. You want to use Ethernet device and offer guaranteed bandwidth to each server. You design the network by <u>connecting all network devices to a switch. Connect each server to its own switch port.</u>

<u></u>

Explanation:

  • A local-area network (LAN) is a computer network that spans a relatively small area.
  • Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.
  • The LAN is the networking infrastructure that provides access to network communication services and resources for end users and devices spread over a single floor or building.
  • Designing a LAN for the campus use case is not a one-design-fits-all proposition.
  • If there is a single 48-port switch, 47 devices can be supported, with only one port used to connect the switch to the rest of the network, and only one power outlet needed to accommodate the single switch

8 0
3 years ago
What is the command to disable any Processes in linix??
stiks02 [169]

Answer: killall[process_name]  or kill[PID]

Explanation:

Killall is a tool for disabling running processes on the system. It will disable all programs that matches the name mentioned.

kill disables processes based on process id numbers. it does not disable the process directly. The process recieves a signal where the process will follow instructions which it has to follow if it receives the signal.

7 0
2 years ago
Do laws ever change to help enforce cyber hacking crimes
prisoha [69]
No I don’t think so personally
5 0
2 years ago
Read 2 more answers
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf
prohojiy [21]

Answer:

The following options are true.

Explanation:

A corporation has requested the user to support minimize the brute force attacks on credentials of their Microsoft account holder's. They effectively eliminated the malware involved in those assaults and have to protect their credentials allocated towards their user profiles properly without restricting the usefulness of the program.

The following should be included in securing the user accounts are need credentials for the user profile, create logon constraints that failed as well as need powerful credentials.

7 0
3 years ago
How many base cases are in the functionabove?
baherus [9]

Answer:

The answer is (b). 1.

Explanation:

In the code there is only 1 base case .

the base case is as following:-

if(n==0)

return 0;

this is the base case.

Base case is the most important statement in the function that uses recursion because without base case the recursion calls will keep on going and we will get a run time error.

5 0
2 years ago
Other questions:
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • Write a function similar to keep_ints like before, but now it takes in a number n and returns a function that has one parameter
    8·1 answer
  • How to buy free big money computers that earn free money everydays?
    15·1 answer
  • 次のうち、ビジネスレターに適したフォントとポイントサイズの選択はどれですか?<br> 私を助けてください!私はあなたを最高にブランコにします!
    12·2 answers
  • Search engines use indexes created by web _________ to provide fast searches.
    7·1 answer
  • Me inculparon de crear una cuenta en Facebook y colocaron el barrio donde vivo, ¿cómo podría demostrar lo contrario? Ayuda urgen
    6·1 answer
  • How are Earth's plates made?
    14·1 answer
  • Briefly explain specialisation?​
    11·1 answer
  • After reading his e-mail messages, Orlando became very frustrated. Many of the messages he received did not conform to netiquett
    6·1 answer
  • Which of the following are pointers?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!