1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
3 years ago
11

Given that a function receives three parameters a, b, c, of type double, write some code, to be included as part of the function

, that checks to see if the value of a is 0; if it is, the code prints the message "no solution for a=0" and returns from the function.
Computers and Technology
1 answer:
never [62]3 years ago
3 0

Answer:

Following are the code in the C Programming Language.

if(a==0) //set if conditional statement

{

//print the following message

printf("no solution for a=0");

}

Explanation:

Here, we define a function and pass three double data type variable i.e., "a", "b", "c" and then we write the following code inside the function.

  • Set the if conditional statement and check that condition is the variable "a" is equal to 0.
  • Then print message through the "printf()" which display on the screen if the given condition is true.
You might be interested in
Help? brainliest and point
stiks02 [169]

Answer: second one

Explanation:

sorry lol

7 0
4 years ago
________ allows only limited use of media that has been legally purchased.
Reptile [31]
Digital Rights Management (DRM) allows only limited use of media that has been legally purchased. The DRM includes access control technologies for <span>copyright protection for </span>digital media. DRM defines <span>what you as a software or hardware user can and can't do with the media and hardware you've purchased. </span> 
3 0
3 years ago
The database cannot be migrated to a different engine because sql server features are used in the application’s net code. The co
Nezavi [6.7K]

Answer:

Explanation:

B is correct

3 0
2 years ago
Select the four tactics that cyber criminals use for stealing information from the list below.
Snowcat [4.5K]
Baiting clickjacking pharming spamming
6 0
2 years ago
HEY DO U LIKE TRAINS!
Triss [41]

Answer:

yes

Explanation:

yes

3 0
4 years ago
Other questions:
  • Assign a pointer to any instance of searchChar in personName to searchResult.#include #include using namespace std;int main() {c
    5·1 answer
  • Net Worth is equal to assets minus liabilities. Which event will have the greatest impact (positive or negative) on one's net wo
    5·1 answer
  • The World Wide Web is a program that allows you to search for information on the Internet.
    11·1 answer
  • What is the name of the keyboard developed in the 1930s?
    13·1 answer
  • Plane eyes I don't know
    9·1 answer
  • In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing
    7·1 answer
  • Brian is a computer engineer who writes security software for a banking system. The
    13·1 answer
  • On React
    13·2 answers
  • Of the following hard drives, which one is fastest?
    13·1 answer
  • Write about how this item was important to you.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!