1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
9

A teacher determines student percentages in a course as the points a student earns divided by the total points available in the

grading period. Points are awarded only in whole number increments, but student percentages are to be stored as decimals.
The following code segment appears in a program used to compute student percentages. Points that a student earns are stored in pointsEarned, the total points available in the grading period are stored in totalPoints, and the student percentage is stored in percentage.
int pointsEarned;
/* missing code */
Which of the following is most appropriate to replace /* missing code */ in the program?
A. int totalPoints;int percentage;
B. double totalPoints;int percentage;
C. int totalPoints;double percentage;
D. int totalPoints;boolean percentage;
E. double totalPoints;boolean percentage;
Computers and Technology
1 answer:
Ainat [17]3 years ago
8 0
I think it will be E
You might be interested in
Why should computers have a file structure?
UkoKoshka [18]
I am guessing "A" because you can store code anywhere and file structure does not prevent viruses.

hope this helped
 <span />
4 0
3 years ago
Read 2 more answers
Input is information a system uses to monitor and adjust itself to meet the goal.
agasfer [191]
That is a true statement. Hope this was helpful!
7 0
3 years ago
True or False <br><br> Rootkits are only made by black-hat hackers.
andreyandreev [35.5K]

Answer:

True

Explanation:

Rootkits are malicious software that allows an unauthorized user to access a computer and restricted areas of software. Rootkits are difficult to detect on your computer because it may be able to subvert there that is intended to find it. Rootkits are created by Black-hat hackers to attack your computer and steal.

Rootkit tools:

1. Keyloggers

2. antivirus disablers

3. password stealers

4. banking credential stealers

5. bots for DDoS attacks

8 0
3 years ago
Which of the following exhibit temporal locality: 1. Repetition control flow 2. Linear search on an array of integers 3. Accessi
Tom [10]

Answer:

1, 2 and 3

Explanation:

Temporary locality occurs when a program accesses an instruction or a  data, there is a high probability that this  same instruction or data will be accessed again soon.

6 0
3 years ago
If my beats by Dre are lighter does that mean they are fake because they feel really light. I have the Solo 3 wireless
lubasha [3.4K]

Answer:

yess

Explanation:

4 0
3 years ago
Other questions:
  • Number Analysis Program: Write a program that reads data from the text file numbers.txt. Assume the file contains a series of nu
    14·1 answer
  • HI GIVING BRAINLIEST Tyra used the software development life cycle to create a new game. She released it to her friends in order
    14·2 answers
  • Who is responsible for ensuring the security of business systems and developing strategies and safeguards against attacks by hac
    9·1 answer
  • What is the standard internet protocol, which provides the technical foundation for the public internet?
    9·1 answer
  • Refer to the exhibit. The PC is connected to the console port of the switch. All the other connections are made through FastEthe
    6·1 answer
  • Refer to the method f: Public int f( int k, int n ) { if( n == k ) return k; else if( n &gt; k ) return f( k, n - k ); else retu
    8·1 answer
  • Computer programming 3
    13·1 answer
  • Jackie is planning a surprise birthday party for her best friend and is researching a location to have the party. Jackie found a
    6·1 answer
  • Rohan is creating a presentation with at least 50 slides. He wants the slides to use a consistent layout and formatting. Which o
    12·1 answer
  • How to disable Fortinet?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!