1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
12

(Rounding Numbers) An application of function floor is rounding a value to the nearest

Computers and Technology
1 answer:
Whitepunk [10]3 years ago
7 0

Answer:

Following are the program in the C++ Programming Language.

//header file

#include <iostream>

//header file for floor function

#include<math.h>

//using namespace

using namespace std;

//define main function

int main() {

 //set and initialize float type variable and value

 float a=12.3, c=1.45, d=165.345;

 //initialize it in other variable

 float x=a;

 //set float variable to store floor value

 float y=floor(x+5);

 //display output with message

 cout<<"before "<<x<<" and after the floor "<<y<<endl;

 //set float variable to store floor value

 y=floor(c+5);

 //display output with message

 cout<<"before "<<c<<" and after the floor "<<y<<endl;

 //set float variable to store floor value

 y=floor(d+5);

 //display output with message

 cout<<"before "<<d<<" and after the floor "<<y;

}

Output:

before 12.3 and after the floor 17

before 1.45 and after the floor 6

before 165.345 and after the floor 170

Explanation:

Here, we define the "main()" function and inside the main function.

  • Set and initialize three float data type variables "a", "c", "d" to 12.3, 1.45, 165.345.
  • Set the float data type variable "x" to store the value of the variable "a"
  • Again set float type variable "y" to store the floor value.
  • Then, Print message and output of the variable.
  • Again we repeat point 3 and 4 two times.
You might be interested in
If the computer you are using is a laptop that moves from one network to another, you can click the _____ tab and configure stat
Leni [432]
If the computer you are using is a laptop that moves from one network to another, you can click the Alternate Configuration tab and configure a static IP address setting for a second network.
4 0
3 years ago
Explain in brief terms some of the technology and developments that were important in the history and development of the Interne
igomit [66]

Answer: The Internet started in the 1960s as a way for government researchers to share information. ... This eventually led to the formation of the ARPANET (Advanced Research Projects Agency Network), the network that ultimately evolved into what we now know as the Internet.

Have a nice day ahead :)

7 0
2 years ago
How many possible password of length four to eight symbols can be formed using English alphabets both upper and lower case (A-Z
Fynjy0 [20]

Answer:

In a password, symbol/characters can be repeated. first calculate the total

symbols which can be used in a password.

So there are total 26(A-Z),26(a-z),10(0-9) and 2(_,$) symbols.

that is equal to 26+26+10+2=64.

Total number of password of length 4:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64=16777216

Total number of password of length 5:

here at each place can filled in total number of symbols i.e 64 way for each

place.Then total number of possible password is:

64*64*64*64*64=1073741824

Similarly,

Total number of password of length 6:

64*64*64*64*64*64=68719476736

Total number of password of length 7:

64*64*64*64*64*64*64=4398046511104

Total number of password of length 8:

64*64*64*64*64*64*64=281474976710656

Hence the total number of password possible is:285,942,833,217,536

7 0
4 years ago
Huffman trees use the _________ of each character to work out their encoding. A) Frequency B) Order in ASCll
Maurinko [17]
I think the answer is C but I could be wrong
5 0
3 years ago
How to you compute for the total room sales​
Furkat [3]

Answer:

[checking question] - Error:

Please give complete/specific questions so more brainies will be able to help you! Check out what makes a great answer/question here: https://faq.brainly.com/hc/en-us/articles/360010136959-Answering-Guidelines ߷

7 0
3 years ago
Other questions:
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • How were the pages made to create the Book of Kells? a. Scribes prepared the papers using a printing press. b. 185 calves were s
    9·1 answer
  • What is imagined risk
    12·1 answer
  • How many instructions can the microprocessor execute each second if the assembly line is present?
    12·1 answer
  • Which of these might be an example of an advertiser's target group?
    12·2 answers
  • Please help and answerr
    8·1 answer
  • Which letter shows the ball when it has the maximum kinetic energy
    15·1 answer
  • When Mark completed his research paper, he decided that he wanted to have all headings to be in bold, underlined, and 14 points.
    11·1 answer
  • Explain four sitting postures in a computer laboratory​
    9·1 answer
  • Question 1 (1 point)
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!