1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
7

Given the integer variables x, y, and z, write a fragment of code that assigns the smallest of x, y, and z to another integer va

riable min.
Computers and Technology
1 answer:
Flura [38]3 years ago
3 0
You should specify what language you're using in these types of questions. Here's an example in C++, which is fairly easy to understand, so you should be able to transfer the concept to another language to problem.

int x = 2, y = 1, z = 3, min;

if (x < y && x < z)
min = x;
else if (y < x && y < z)
min = y;
else if (z < x && z < y)
min = z;
else
std::cout << "There is no minimum";
You might be interested in
Does this mean that the radius is the input aka 3 ? what about the PI ?
strojnjashka [21]

Explanation:

In  this question

d is known as diameter

r is known as radius

c is known as circumference

pi is known as π

a is known as area

Now, In Maths

Area of circle = π×r×r

Circumference of circle = 2×π×r

Radius (r) = diameter(d)÷2

Given diameter is 6

then, r = 6 ÷2

r = 3

so, diameter = 6

radius = 3

circumference = 2×π×r

                        = 2×3.14×3 ( the value of π is equal to 3.14)

                        = 18.84

Area = π×r×r

= 3.14×3×3 ( the value of π is equal to 3.14)

 = 28.26

6 0
3 years ago
You use a(n) ____ program to create, send, receive, forward, store, print, and delete e-mail messages.
tigry1 [53]

Answer:

B - E-Mail

Explanation:

This is a program to create, send, receive, forward, store, print, and delete e-mail messages.

3 0
3 years ago
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signa
Ber [7]

Answer:

import java.util.regex.*;

import java.util.Scanner;

public class Password

{

  public static void main(String[] args) {

  Scanner input = new Scanner(System.in);

  System.out.println("Please enter the Password. \n");

  String passwordString = input.next();

  System.out.println(passwordCheck(passwordString));

  }

  public static boolean passwordCheck(String password){

  if(password.length()>=8 && password.matches("[a-z0-9A-Z]+")){

  return true;

  }

  else{

  return false;

  }

  }

}

Explanation:

The Java class "Password" is used by the program to make an instance of the password object and check its validity with the passwordChecker method defined within the Password class. The passwordChecker method only matches alphanumeric passwords, that is, passwords with alphabets and numbers. If a non-alphanumeric character is encountered, the boolean value false is returned.

6 0
3 years ago
It is necessary for us to verify and checked information before we shared online? Explain​
lesya [120]

Answer:

The answer is yes.

Explanation:

If you don’t check where the source is from and if it is verified, you may share an incorrect and false answer. Also, you may type in your personal information. This is <u>VERY</u> risky. Do <u>NOT</u> share your private information to strangers!

You can check your information by searching it up online or asking a teacher! There! I hope this helps! ;)

4 0
2 years ago
A(n) ____ attack is a method of combining attacks with rootkits and back doors.
kicyunya [14]
The correct answer is:   [A]:  "hybrid" .
_____________________________________________________________
    " A <u>  hybrid  </u><u /> attack <span>is a method of combining attacks with rootkits and back doors."
_____________________________________________________________</span>
3 0
3 years ago
Other questions:
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • Rather than a single address, you can refer to an array using their first (top/Left) and last (bottom/right) addresses separated
    15·1 answer
  • Write a statement containing a logical expression that assigns true to the
    13·1 answer
  • If you have two pennies, the probability of both coming up heads when flipped
    13·2 answers
  • In addition to analyzing logic and program code, a project team usually holds a session with users, called a ____ walkthrough, t
    6·1 answer
  • For the following scenario, indicate whether the action is a good practice or bad practice for safeguarding your personally iden
    6·1 answer
  • What is thought to have caused the extinction of the dinosaurs?
    13·1 answer
  • Finish the code where it says //YOUR CODE HERE
    11·1 answer
  • The Mac OS was the first to use a graphical user interface.<br><br><br> False<br><br> True
    7·1 answer
  • The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!