1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kolezko [41]
3 years ago
5

Declare a variable temperature and initialize it to 98.6. Instructor Notes: Note that "initialize" means "declare and assign a v

alue in the same statement." ote that this exercise wants a single statement, not a complete program. What data type is appropriate for a value such as the value listed above?
Computers and Technology
1 answer:
natali 33 [55]3 years ago
6 0

Answer:

float temperature = 98.6; //declaration and initialization of the variable

Explanation:

In the programming language, there are two types of data types for the decimal number that is float and double.

  • Double data type is used when we require to print more than two decimal value and it also contains both integer type and decimal type value.
  • Float data type is used when we required to print one or two decimal value, it only contains and print decimal value.

So, we have to print one decimal value, that's why we use float data type.

You might be interested in
What are the special features of fifth generation that makes it different from the other generations?​
Salsk061 [2.6K]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

               "features of fifth generation"

The fifth generation computer system was an initiative by japans ministry of international trade and industry,begun in 1982,to create computer using massively parallel computing and logical programming.It was to be the result of massive government industry research project in japan during the 1980.It aimed to create an epoch making computer with supercomputer liked performance and to provide a platform for future development in artificial intelligence.There was also an unrelated Russian project also named as the fifth generation computer.

The term fifth generation was untended to convey the system as being a leap beyound existing machines.In the history of computing hardware,computer using vacuum tubes were called the first generation;transistors and diodes,the second;integrated circuits,the third;and those using microprocessors,the fourth.Whereas previous computer generation had focused on increasing the number of logic elements in a single CPU,the fifth generation,it was instead turn to massive numbers of CPU for added performance.

5 0
3 years ago
Escribe todas las posibles combinaciones que pueden haber entre 4 bits.
Vedmedyk [2.9K]

Answer:

The answer is "\bold{2^n\ \  _{where} \ \ \ n \ is\ bit }"

Explanation:

The Combinations could be produced by using n-bits 2^n . It s enables you to generate the 4-bit numbers that are:

\to  2^4 = 16 combinations.

for the 4-bit, the combination of 2 = 16, which are its possible combination and for the   10 variations  appropriate 16 combinations are used,  As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.

7 0
3 years ago
What is the Slide Sorter View used for?
bonufazy [111]

Answer:

b. bc u can delete and add slides in ur presentation

3 0
3 years ago
Read 2 more answers
The 10 IISSCC _____ cover 17 NIST control _____ which are arranged in three _____ called management, operational, and technical.
almond37 [142]

Answer:

Controls, families, domain

Explanation:

ISSCC means international information systems security certification consortium.

They are also known as ISC square, they offer two security certification the cissp and sccp.

7 0
3 years ago
Read 2 more answers
URGENT!!! Which statement is true with regard to bitmap images?
liberstina [14]

Answer:

<u><em>D. You can modify colors easily and quickly.</em></u>

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Preserving confidentiality, integrity, and availability of data is a restatement of the concern over interruption, modification,
    15·1 answer
  • What are the six critical components of an information system? Select three of the six components, and describe a potential vuln
    15·1 answer
  • The program evaluation and review technique (PERT) is __________. a. a network-based technique in which there is a single time e
    15·1 answer
  • Que es la fisiconometria?
    10·1 answer
  • PLEASE PLEASE PLEASE PLEASE PLEASE HELP! I'M BEGGING Y'ALL! I NEED THIS FOR TODAY! CORRECT ANSWERS WILL BE AWARDED BRAINLIEST!
    6·1 answer
  • A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database app
    13·2 answers
  • What could be a pass word if the hint is stayton its for windows 10 <br><br> please help
    5·1 answer
  • Gauthmath https://s.tutorus.xyz/lp/invite?code=GGQGBL​
    13·1 answer
  • I am having horrible trouble with deciding if I should get Audacity or Adobe Spark for recording, if someone could help me choos
    15·2 answers
  • ________ include programs such as word processing, spreadsheet, database,presentation graphics. Personal information,
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!