1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
7

Write a program that prompts the user to input the decimal value of a double and outputs the number rounded to the nearest integ

er.

Computers and Technology
1 answer:
KengaRu [80]3 years ago
5 0

Answer:

#include <bits/stdc++.h>

using namespace std;

int main() {

double n;

cout<<"Enter a decimal number: ";

cin>>n;

int Round= floor((n- floor(n))*2);

if(Round==0)

{

n= floor(n);

}

else n= ceil(n);

cout<<n;

return 0;

}

You might be interested in
RFID tags uses memory that is read-only.A. TrueB. False
rewona [7]

Answer:

true

Explanation:

4 0
3 years ago
PLEASE HELP Which of the following is considered a modern method of communication?
vlada-n [284]
The answer would be telegraphs
7 0
3 years ago
Read 2 more answers
Meaning of page break​
zmey [24]

Answer:

a point at which a price of continuous text is split into two pages

Explanation:

for ex: a page break is treated as a single character in the document.

6 0
3 years ago
Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
Westkost [7]
Im really not sure but i need points so i can ask questions so i can get my math classes done so then i can graduate sos help
5 0
4 years ago
If a class has member variables that are pointers, you must ensure that you implement ____.
DedPeter [7]

Answer:

objects

Explanation:

pointer are used for the objects

5 0
3 years ago
Other questions:
  • If you delete an imessage does the other person see it
    12·1 answer
  • A bank uses a computer program during the night to tell if the alarm should ring. Sensors in the bank set the following Boolean
    5·1 answer
  • A hacker uses a valid IP address of an internal host, and then from an external system, the hacker attempts to establish a commu
    11·1 answer
  • Write a function called convert_format which converts the format of a date from mm/dd/yyyy to month name dd, yyyy.
    12·1 answer
  • Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
    15·2 answers
  • What is the turns ratio of the transformer T10261
    5·1 answer
  • Which page in a web site do viewers usually see first?
    15·1 answer
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • Which is the OS that can be obtained for free or at a much lower price than other major operating systems?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!