1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Otrada [13]
3 years ago
5

Consider the following code: x = 9 y = -2 z = 2 print (x + y * z) What is output? 9 13 14 5

Computers and Technology
1 answer:
lora16 [44]3 years ago
3 0

Answer:

5

Explanation:

x = 9

y -2

x = 2

expression = (x + y * z)

Apply BODMAS rule.

= 9 + (-2 * 2)

= 9 + (-4)

= 9 - 4

= 5

You might be interested in
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad
Sati [7]

Answer:

P2P network is the correct answer to the following question.

Explanation:

Because the P2P network is the network that is used to share the resources of the computer system. It also allows the users to link two or more than two computer systems and also allows them to share all kinds of resources of the system. So, that's why Bethany and her family members used the P2P network type.

4 0
3 years ago
Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should
vivado [14]

Rajesh might want to avoid the use of a web app for the project due to connectivity issues. Hence, one reason he might want to avoid using the Webb app is slow or poor internet connection.

Collaborating on a web application relies very heavily on network connectivity which is the what establishes the link ms allows the apllications to achieve optimum performance.

Therefore, slow internet connection is a major reason whuhe might want to avoid using a web app.

Learn more : brainly.com/question/25531734

6 0
3 years ago
What is a hash function? A. A function that computes the location of the values in the array B. A function has allocated memory
galina1969 [7]

Answer:

A hash function is a function which when given a key, generates an address in the table. The example of a hash function is a book call number. Each book in the library has a unique call number. ... The later is always possible only if you know (or approximate) the number of objects to be proccessed.

Explanation:

A

3 0
3 years ago
Read 2 more answers
Change the file name for index.html to index.php
Damm [24]

The PHP code is given below:

<h3>PHP code</h3>

if(isset($_REQUEST['login_btn'])){

       $email = filter_var(strtolower($_REQUEST['email']),FILTER_SANITIZE_EMAIL); //strtolower changes email to all lower case

       $password = strip_tags($_REQUEST['password']);

The remaining code is in the file attached.

 

Read more about PHP here:

brainly.com/question/27750672

#SPJ1

Download txt
4 0
2 years ago
What is the advantage of using plenum cable for twisted-pair cable?
adell [148]

The advantage of using plenum cable for twisted- pair cable  is it is "Fire resistant"

<u>Explanation:</u>

Plenum cable is a cable that is used in plenum spaces of buildings. These cables have fire resistance characteristic with low smoke. These cables are self extinguishing, and never re-ignite. They require less space for installation and allows space for air circulation to be used by the HVAC system. Twisted-pair, coaxial, HDMI and DVI variants of cable are manufactured in the plenum version. Plenum cable is mandatory to be fixed in any "air handling" area.

7 0
3 years ago
Other questions:
  • What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manu
    9·1 answer
  • Each​ _____ in a relational database table is a unique record of something that users want to track.
    14·1 answer
  • What is a series of instructions or commands that a computer follows used to create software
    9·1 answer
  • What is the best overall approach to education and career development for IT professionals?
    14·2 answers
  • To do a good job of searching periodicals at your library, you should use A) the Library of Congress Authorities webpage. B) web
    10·1 answer
  • Tiffany is writing a program to help manage a bake sale. She writes the following code which prompts the user to enter the total
    15·1 answer
  • Which of the following is NOT a safety practice for working near power lines?
    14·1 answer
  • What do you mean by real time system? Why real time system needs to response within limited time?
    6·1 answer
  • Answer this pls ASAP
    11·1 answer
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!