1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
5

Write a statement that defines a double variable named result, initialized with the value 6.759.

Computers and Technology
1 answer:
In-s [12.5K]3 years ago
3 0

Answer:

"double result=6.759;" is the correct answer for the above question.

Explanation:

  • In c-programming language, the double is a data type which stores the decimal value up to 6 decimal point.
  • This data type takes 8 bytes space in memory when it is used in the c-programming language.
  • When the user wants to declare the double data type, then he should need to declare by the help of the following syntax-- double variable_name_or _identifier_name;
  • When the user wants to declare the double data type and initialize the value on its then he can do this with the help of the following syntax--double variable_name_or _identifier_name= value_which_needs_to_store;
  • The above question asked the one-line statement which declares the result variable of double data type and initializes the "6.759" value on its then he can do this by the help of "double result=6.759;" statement which is described above. Hence the answer is "double result=6.759;".

You might be interested in
WILL GIVE BRAINLIEST!!! Danielle is warehouse supervisor for a large shipping company. Most shipments need to leave the warehous
VMariaS [17]

Answer:

Punctuality

Explanation:

She needs to get there earlier so that she can see the drivers out on time.

4 0
2 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
Which is an advantage of programming with a procedural language?
mestny [16]
What are the choices

3 0
3 years ago
Read 2 more answers
What is the name of the option in most presentation applications with which you can modify slide elements?
olga55 [171]

Answer:

Answer to both the question is View Master.

Explanation:

Slide Master View is an element in PowerPoint that enables one to bring modification in slides and slide layouts in the presentation applications. From this option, one is able to edit the slide master. By modifying the slide master, every slide in the presentation is affected. Using this feature, one can also modify single slide layouts.

To select Slide Master command, go to View then select the Slide Master Command, and the Slide Master view will appear on the screen.

Therefore, View Master is the correct answer.

3 0
3 years ago
Read 2 more answers
Exchanging which type of data uses the least bandwidth?
Over [174]
Voice. voice uses the least bandwidth
5 0
3 years ago
Read 2 more answers
Other questions:
  • A 10-foot ladder must make an angle of 30° with the ground if it is to reach a certain window. What angle must a 20-foot ladder
    9·2 answers
  • Geobubble Chart (2D) displaying Robot Density Per 10,000 Employees for the specified countries;
    7·1 answer
  • Professionalism is defined as what?<br> ASAP PLEASE!
    11·1 answer
  • Research for a project should be based on?
    7·2 answers
  • A ______________ is a way of taking a screenshot or a picture of your computer screen. ​
    14·1 answer
  • Draw a datapath that can perform the following set of register replacement and combinational operations. Assume all registers ar
    5·1 answer
  • The first cell phones in widespread use were . Smartphone technological advancements added services. Answer the following questi
    12·2 answers
  • What is a cpu in full explanation?
    7·2 answers
  • A. Get a value for x from the user.
    13·1 answer
  • Algorithm to eat orange<br><br>​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!