1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataliya [291]
3 years ago
5

What will you see on the next line? >>> int(19.725)

Computers and Technology
1 answer:
Aleks [24]3 years ago
5 0

Answer:

In the next line, you would see the value 19

Explanation:

This is because in the C++ programming language the int() function being used in this question takes a double value as an argument and rounds it down to the nearest whole number. Therefore, since in this scenario the argument being passed is 19.725, if we round it down to the nearest whole number we would get 19. The int() function does this and returns the value 19 in the next line.

You might be interested in
You are a networking consultant who has been asked to penetration test the network of a small business. you located a target wir
cluponka [151]
<span> In a network that uses WPA2-PSK encryption you can bypass the encryption by using the weakness in the WPA2-PSK system and that is the following:the encrypted password is shared in what is known as the 4-way handshake. </span> When a client authenticates to the access point, the client and the AP go through a 4-step process of authentication.
8 0
3 years ago
Which is the highest level of the hierarchy of needs model?
navik [9.2K]
I believe the answer is C.
5 0
3 years ago
Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
Nesterboy [21]

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

5 0
2 years ago
How did the public feel towards Martin Luther King, Jr.?
Phoenix [80]

Answer:

Most Americans admire the life and work of Martin Luther King Jr., but their perception of him is smoke and mirrors.

Explanation:

hope this is what youre lookin for

6 0
2 years ago
Whose task it is to ensure that the product flows logically from one step to another?
AleksAgata [21]
UX i believe. Web designer and graphic designer are visual which is the basis of UI. Think of UX as User eXperience and in order to have a good experience it has to flow. If it can flow then u can design it. Think of UX as the skeleton and UI is the flesh
3 0
3 years ago
Other questions:
  • Regulatory control limits the activities of an organization in compliance with the organization's policies. True False
    14·2 answers
  • before donating a computer you should use a program to wipe the hardest to remove all of his data true or false
    6·1 answer
  • #Electrical Engineering
    13·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • What is the missing term in the code that handles that error??
    11·1 answer
  • In which generation of computers are we in?​
    9·1 answer
  • Check all of the file types that a Slides presentation can be downloaded as.
    5·2 answers
  • Is Naab a system of an accounting system? A factory operations system? or both? explain your answer
    12·1 answer
  • What are 2 ways computers can connect to a network?
    5·1 answer
  • Please explain what steps you will take to prevent hackers from getting access to your personal information.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!