1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
11

Create a float variable named circumference.

Computers and Technology
1 answer:
Likurg_2 [28]3 years ago
5 0

Answer:

Float circumference; // Create a float variable

Explanation:

The float datatype is used for storing the decimal point values .The syntax  to declaring  any float variable is given below.

float variable-name;

float  circumference; // create a float variable

circumference=89.9007;; // store the value in circumference

Following are program in c++

#include <iostream> // header file

using namespace std; //namespace

int main() // main function

{

   float circumference; // creating variable float

   circumference=89.9007; // storing value

   cout<<circumference;  // display value circumference

   return 0;

}

Output:

89.9007

You might be interested in
Which nmap switch is used to detect target OS and services?<br> a -S<br> b -p<br> c -F<br> d -A
antiseptic1488 [7]

Answer:

d -A

Explanation:

The -S switch is used to use a fake source address, and it can mask your ip.

The -p switch is used to indicate which ports you want to scan, because then it searches for all open ports it searches for that one specifically

The -F switch is used as the quick scan mode, scanning the surface

The -A switch is used to check the operating system.

3 0
3 years ago
By changing the field size for text to the maximum number necessary,
Inessa05 [86]

Answer:

The correct option is;

A. The file will not take up as much space on the database

Explanation:

Changing the field size of a field that does not contain data limits the size of taken up by the data values added to the field. The field size for text field determines the disc space that each value of the field allowed to take up by Access

When the field size is changed for fields containing data, the data values in the field that have values higher than the maximum field size are truncated while the field size of subsequent data are limited as stated above.

8 0
3 years ago
PASSAGE: The picnic had been scheduled for weeks in advance. The Morris family was looking forward to some fun and relaxation wi
Mekhanik [1.2K]

Answer:

B) The sky began to darken and rumble.

Explanation:

B) The sky began to darken and rumble.

It seems they have arranged it big. Hence, the money is not a problem. Any number of people can be invited,

The problem was certainly that the rain was about to come as sky turned dark and rumble. And hence, this answer as its what created tension.

7 0
3 years ago
Computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the ri
Shkiper50 [21]

Answer:

The following statement is 'True'.

Explanation:

There is a software named 'Proprietary software' and also called 'closed-source software', it's non-free software and used to describe the software that is not freely licensed such as operating system, file formats, and system programs. this software is licensed for studying, sharing, modification, redistribution and reverse engineering and has the copyright to use the software under only certain conditions and we can also say that it bears limit against these types of uses.

6 0
3 years ago
The 3 parts of the CPU are
katrin2010 [14]

Central Processing Unit

Arithmitic Logic Unit

Control Unit


3 0
4 years ago
Read 2 more answers
Other questions:
  • Anti-bullying laws in most states are designed to provide
    14·2 answers
  • Amanda, a project manager, conducted a team meeting consisting of testing and development team. She insisted on clear communicat
    11·1 answer
  • How can the Column settings be accessed?
    12·2 answers
  • How can you autohide the taskbar in Windows 10?
    8·2 answers
  • From the Software Engineering Code of Ethics, which clauses relate to intellectual property (check all that apply)
    15·1 answer
  • Write a program that allows the user to enter their name from the keyboard. Allow the user to pick how many times they want thei
    12·1 answer
  • Write a program to Test if mold is stored in the variable word.
    5·1 answer
  • 1.a computer can create an output based on the input of the user.
    13·1 answer
  • What are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, r
    8·1 answer
  • Digital censorship uses automated, intelligent systems with big data storage to _____. Select 3 options.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!