1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
3 years ago
11

What is the value of i printed? j = i = 1 i += j + j * 5 print("What is i?", i)

Computers and Technology
1 answer:
Maurinko [17]3 years ago
4 0

Answer:

7

Explanation:

Given the codes as follows:

  1. j = i = 1  
  2. i += j + j * 5  
  3. print("What is i?", i)

In line 1, the value of 1 is assigned to variable i and then the variable i is assigned to variable j. This means j will hold the value of 1 as well.

In line 2, j will be multiplied with 5 prior to the addition with j itself. So, j + j * 5 -> 1 + (1 * 5) -> 1 + 5 -> 6

Next, value of 6 will be added with i. i = i + 6  ->  i = 1 + 6 -> 7#

Eventually, value of 7 will be printed out (Line 3).

You might be interested in
Program documentation _____.
otez555 [7]

Answer:

Option A is the correct option for the following question.

Explanation:

Because Program documentation is the documentation in which contain the information about the software and also contain the logic of the modules of the program is user-friendly and convenient language about that application or the software and it is hard copy or any digital manual through which the programmer has to know about the application.

So, that's why the following option is correct.

7 0
3 years ago
Which media vehicle uses the Dreamweaver software for its design? A(n) "blank" uses the Dreamweaver software for its design.
Inessa [10]
Answer: Websites

Explanation: Adobe Dreamweaver CC is a web design and an Integrated Development Environment (IDE) application that is used to develop and design websites.
3 0
3 years ago
Consider a company that needs to sort an array of structures of type Customer by balance, with the largest balance first. Here i
8090 [49]

Answer:

#include <iostream>

#include <string>

#include <cstring>

#include <cstdlib>

using namespace std;

struct Person

{

string name;

int age;

};

int main()

{

struct Person data[10];

struct Person *pData[10],*temp;

string names[] = {"a","b","c","g","z","l","p","q","r","w"};

int num[] = {4,6,34,8,13,90,33,22,18,23};

for(int i=0;i<9;i++)

{

data[i].name = names[i];

data[i].age = num[i];

pData[i] = &data[i];

}

for(int i=0;i<9;i++)

{

for(int j=i+1;j<9;j++)

{

if(pData[i]->name.compare(pData[j]->name)>0)

{

temp = pData[i];

pData[i] = pData[j];

pData[j] = temp;

}

}

}

for(int i=0;i<9;i++)

{

cout<<pData[i]->name<<" "<<pData[i]->age<<endl;

}

}

Explanation:

The line #include <iostream> initializes the program.

This program created an array of only 10 structures, Customer data. Also defined an auxiliary array Customer *pData.

The program uses these parameters to sorts the array of pointers so that when you go through pData in increasing order of index k, the entries pData[k] point to Customer objects in decreasing order by balance, meaning that pdata[0] now points to the customer with the highest balance, and pData[9] points to the customer with the smallest balance.

4 0
3 years ago
Attackers need a certain amount of information before launching their attack. One common place to find information is to go thro
VARVARA [1.3K]

Answer:

The answer is Letter D. Dumpster diving.

Explanation:

This process of going through a target's trash is known in the community as dumpster diving. This attack is a technique used to retrieve information that could be used to carry out an attack on a computer network.

It is important to inform that the dumpster diving it is not limited to searching through  the trash for obvious treasures like acess codes or passwords written down on sticky notes.

8 0
3 years ago
Which of the following scenarios falls into the category of network crimes?
solong [7]

Answer:

B

Explanation:

Hope it helps!

3 0
3 years ago
Read 2 more answers
Other questions:
  • . What may happen if a large number of computer users are attempting to access a Web site at the same
    10·2 answers
  • This is a free point thing!! I am giving 100 points!! Anyone wanna talk!!!!
    11·2 answers
  • Jane is debugging a code consisting of 25 lines. The code starts executing at line 11. At line 13, the code calls another method
    10·2 answers
  • Without protocols the information sent and received through the Internet would never reach its intended target and even if it di
    6·1 answer
  • What will empty the log of Internet sites you have recently viewed
    12·2 answers
  • Edie wants to visit her university's website. What software application should she use?
    9·2 answers
  • Thank you very much for your email. ...... was very interesting​
    15·1 answer
  • Please help explain this calculator code.
    15·1 answer
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • . Question 2 Fill in the blank: R Markdown notebooks can be converted into HTML, PDF, and Word documents, slide presentations, a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!