1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
6

What will be the value of “sumtotal” when this code is executed?

Computers and Technology
1 answer:
Lelu [443]3 years ago
4 0

Answer:

2

Explanation:

if-else is the statement that is used for checking the condition and if the condition is True, then execute the statement otherwise not executed.

initially, the value of n1 = 3, n2 = 6, n3 = 2, sumtotal = 4.

after that, if statement checks for the condition.

3 != 4

condition is TRUE, then the statement sumtotal -= n3; will be executed.

write the statement in simple form:

sumtotal = sumtotal - n3;

so, sumtotal = 4-2 = 2.

after that, the program does not check the further and exit the if-else statement.

Therefore, the answer is 2.

You might be interested in
Xml provides a standardized, non-customizable way to describe the content of a document.
Rainbow [258]
XML (eXtensible Markup Language) is a meta-language that defines a language (of your creation, within XML specs). The language that you create has to follow your specifications.
7 0
3 years ago
Describe the Pros and Cons Associated with Cloud Computing Cloud Computing was introduced in 1999 by a company named "Salesforce
Rudik [331]

Answer & Explanation:

Pros of cloud computing:

  • Cloud computing provides high speed due to faster deployment of services in fewer clicks.
  • It eliminates the need of IT infrastructure and manageability.
  • It is cost efficient as it provides huge space availability.
  • It makes it easy to get backup and recovery.
  • It is easy to access information anytime and anywhere in the world.
  • Due to cloud computing, it is very easy to add or remove services as required.

Cons of cloud computing:

  • It makes the data vulnerable and information theft challenges can be encountered.
  • Internet connection is required all the time.
  • There is less control available as it runs on remote servers.
  • Migrating information can become difficult.
  • It can face technical issues so the information will not be available for a limited time.
7 0
3 years ago
A man travel 200m towards east<br />from his house then takes left<br />to turn and moves 200 m north<br />fin
11Alexandr11 [23.1K]
Using the Pythagorean theorem:

200^2 + 200^2 = x^2

x = 282.842712... from the original distance
4 0
3 years ago
You use the ____ operator to reverse the meaning of a boolean expression.
charle [14.2K]
!  actually it means not, which reverses a boolean.
8 0
3 years ago
1.Blocul care asigura impedanta necesara la intrarea aparatului de masurat numeric este:
Ahat [919]

Answer:

I never thought of it ike that, the whole fate of the universe just changed before me

Explanation:

5 0
2 years ago
Other questions:
  • Write a class named Episode. An instance of this episode class will represent a single episode of a TV show, with a title, a sea
    12·1 answer
  • What effect does the interconnectedness of modern media have on society?
    14·2 answers
  • Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
    6·1 answer
  • Mrs. Dunn shows her students a data range, which has been named "Goals," covering cells A14 to A25. She tells her students that
    15·1 answer
  • Implement a program that manages shapes. Implement a class named Shape with a method area() which returns the double value 0.0.
    15·1 answer
  • Who play fortnite gameeeeeeee
    14·1 answer
  • -) An attribute is a(n)?
    5·1 answer
  • Which of the following is an example of group dynamics?
    8·1 answer
  • At the heart of every computing device is a(n) _______________, which is usually a single, thin wafer of silicon and tiny transi
    12·1 answer
  • A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!