1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-BARSIC- [3]
3 years ago
6

What will be the value of “sumtotal” when this code is executed?

Computers and Technology
1 answer:
Lelu [443]3 years ago
4 0

Answer:

2

Explanation:

if-else is the statement that is used for checking the condition and if the condition is True, then execute the statement otherwise not executed.

initially, the value of n1 = 3, n2 = 6, n3 = 2, sumtotal = 4.

after that, if statement checks for the condition.

3 != 4

condition is TRUE, then the statement sumtotal -= n3; will be executed.

write the statement in simple form:

sumtotal = sumtotal - n3;

so, sumtotal = 4-2 = 2.

after that, the program does not check the further and exit the if-else statement.

Therefore, the answer is 2.

You might be interested in
A document created by the scriptwriter that contains general information about a program is called _____.
denpristay [2]
It is called the, "Program Proposal".
7 0
3 years ago
________ is interpreted. Group of answer choices A. Python B. C C. C D. Ada E. Pascal
rusak2 [61]

The interpreted are;

  • A. Java
  • B. C++
  • D. C#
<h3>What is interpreted programming language?</h3>

An interpreted language is known to be a kind of languagewhere its implementations often carry out or execute instructions directly.

Note that The interpreted are;

  • A. Java
  • B. C++
  • D. C#

Learn more about Java from

brainly.com/question/25458754

#SPJ11

7 0
2 years ago
The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed
Zepler [3.9K]

Answer:

b. Customized auditing.

Explanation:

Vulnerability scanning is a process of finding or testing a system for weak or vulnerable spots which can be exploited by outsiders. It helps to boost the computer network in an organisation.

There are two types of vulnerability scanning, they are credentialed and non-credentialed scanning and they are defined as implied. The non credentialed scan requires no authorisation and credentials for scanning to take place while credentialed scan is the reverse.

The credentialed scanning provides baseline and customised auditing features.

3 0
3 years ago
Read 2 more answers
suppose you need to verify how to correctly use commas. you pen your English textbook and scan the chapter titles in which one w
Leviafan [203]
D- Proper punctuation
6 0
3 years ago
1. Build and test D-type Flip-Flop using a built-in SR flip-flop.
GaryK [48]

Answer:

The attached files contain the realization of a D flip-flop from an RS flip-flop. It also contains the truth tables for both kinds of flip-flops

Explanation:

An SR flip flop is like a light switch. Set turns it 'on' and reset turns it 'off'

A D type flip-flop is a clocked flip-flop which has two stable states. A D type flip-flop operates with a delay in input by one clock cycle.

D type flip-flops are easily constructed from an SR flip-flop by simply connecting an inverter between the S and the R inputs so that the input to the inverter is connected to the S input and the output of the inverter is connected to the R input.

8 0
3 years ago
Other questions:
  • What best describes the advantage of using the model of a food web?
    12·2 answers
  • Slicing can best be described as
    9·1 answer
  • Where will the CPU store data for easy access and quick retrieval during these computations?
    13·1 answer
  • Which note-taking method quickly captures and organizes information?
    9·2 answers
  • What term is defined as private data placed in a packet with a header containing routing information that allows the data to tra
    13·1 answer
  • Explain with the help of an example that family background affects the entrepreneurial behaviour of people
    12·1 answer
  • Jerry wants to save his company money. He decides to move to open source software for his word processing needs. Jerry then down
    5·1 answer
  • Which statement describes one drive?
    6·1 answer
  • Procedural programs specify instructions that a processor must execute to perform computations. These programs sometimes consist
    11·1 answer
  • Simple example of hybrid computer​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!