1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
3 years ago
10

c Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in a

n expression.

Computers and Technology
1 answer:
Fofino [41]3 years ago
4 0

Answer:

maxSum = FindMax(numA, numB) + FindMax(numY, numZ);

Explanation:

In the statement, maxSum is a double type variable which is assigned the maximum of the two variables numA numB PLUS the maximum of the two variables numY numZ using which are found by calling the FindMax function. The FindMax() method is called twice in this statement one time to find the maximum of numA and numB and one time to find the maximum of numY numZ. When the FindMax() method is called by passing numA and numB as parameters to this method, then method finds if the value of numA is greater than that of numB or vice versa. When the FindMax() method is called by passing numY and numZ as parameters to this method, then method finds if the value of numY is greater than that of numZ or vice versa. The PLUS + sign between the two method calls means that the resultant values returned by the FindMax() for both the calls are added and the result of addition is assigned to maxSum. The screenshot of program along with its output is attached.

You might be interested in
What is the purpose of a poster frame?
serious [3.7K]

Answer: the last one

Explanation:

6 0
3 years ago
Read 2 more answers
Which mitigation technique would prevent rogue servers from providing false ip configuration parameters to clients?
IrinaVladis [17]
DHCP snooping is a mitigation technique<span> to </span>prevent rogue<span> DHCP </span>servers  <span>from </span>providing false IP configuration parameters to clients.  DHCP snooping<span> is a security feature that acts like a firewall between untrusted hosts and trusted </span>DHCP<span> servers. It is</span><span> a series of techniques applied to improve the security of a </span>DHCP<span> infrastructure. </span>
6 0
3 years ago
Read 2 more answers
What is the name given to the software testing technique, which basically consists of finding implementation bugs using malforme
cupoosta [38]

Answer:

Fuzz testing

Explanation:

Fuzz testing technique was developed by Professor Barton Miller and his students in the year 1989 at the University of Wisconsin Madison. This Fuzz testing technique is used in finding implementation bugs using malformed/semi-malformed data injection in an automated fashion.

6 0
4 years ago
Read 2 more answers
In which network zone should a web server be placed?
Cloud [144]

Answer:

DMZs

Explanation:

"That's fine for a small company, but a larger company should consider creating a perimeter security network called a demilitarized zone (DMZ) that separates the internal network from the outside world. DMZs are the best place for your public information."

       - ZDNetwww.zdnet.com › article › dmzs-for-dummies-5000297743

7 0
3 years ago
Design a class called NumDays. The class’s purpose is to store a value that represents a number of work hours and convert it to
stepladder [879]

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

class NumDays{

int hours;

float day;

public:

NumDays()

{

hours=0;

day=0.0;

};

NumDays(int h)

{

hours=h;

day=float(h/8.0);

};

int getHour()

{

return hours;

}

float getDay()

{

return day;

}

NumDays operator +(NumDays obj)

{

int h=getHour()+obj.getHour();

NumDays temp(h);

return temp;

}

NumDays operator -(NumDays obj)

{

int h=getHour()-obj.getHour();

NumDays temp(h);

return temp;

}

const NumDays& operator++() //prefix

{

++hours;

day=float(hours/8.0);

return *this;

}

const NumDays& operator--() //prefix

{

--hours;

day=float(hours/8.0);

return *this;

}

const NumDays operator++(int) //postfix

{

NumDays temp(*this);

++hours;

day=float(hours/8.0);

return temp;

}

const NumDays operator--(int) //postfix

{

NumDays temp(*this);

--hours;

day=float(hours/8.0);

return temp;

}

};

int main()

{

NumDays obj(2),obj2(10),obj3,obj4;

obj3=obj2-obj;

cout<<"'obj3=obj2-obj'=> Day:"<<obj3.getDay()<<"##Hour:"<<obj3.getHour()<<"\n";

obj3=obj+obj2;

cout<<"'obj3=obj+obj2'=> Day:"<<obj3.getDay()<<"##Hour:"<<obj3.getHour()<<"\n";

obj4=obj3++;

cout<<"'obj4=obj3++' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=++obj3;

cout<<"'obj4=++obj3' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=obj3--;

cout<<"'obj4=obj3--' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=--obj3;

cout<<"'obj4=--obj3' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

};

3 0
3 years ago
Other questions:
  • The process of using a computer to write, design, and assemble documents is called A. desktop publishing. B. scanning. C. consul
    7·1 answer
  • When a defendant pleads guilty to one offense just to have another offense dropped, this is what type of plea bargain
    14·2 answers
  • You are building a predictive solution based on web server log data. The data is collected in a comma-separated values (CSV) for
    7·1 answer
  • _____ are networks that learn and are capable of performing tasks that are difficult with conventional computers.
    11·1 answer
  • Meg logs into her email account without entering her user ID and password manually every time. She also finds results from searc
    11·1 answer
  • If you have four documents open and click the x button on the title bar, _____.
    8·1 answer
  • When writing an algorithm, the step after carrying out your plan is "sharing results."
    5·2 answers
  • Any one know??please let me know
    15·2 answers
  • True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.
    7·1 answer
  • What are the four components of security documentation?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!