1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
8

If x=50.7,y=25.3 and z is defined as integer z,calculate z=x+y​

Computers and Technology
1 answer:
ANTONII [103]3 years ago
3 0

Answer:

Ans: 76

Explanation:

z=x+y

=50•7 + 25•3

=76#

You might be interested in
Who is he can anyone help me​
34kurt
This person is Elon Musk, the owner of Tesla :)
5 0
3 years ago
Read 2 more answers
Every preprocessing directive must begin with:
Anni [7]

Answer:

B. #

Explanation:

Every preprocessing directive must begin with the # character.

For example:

#define : Used to define a macro

#ifndef : Conditional evaluation of macro

#include : Used to include other preprocessor header file as part of the code

As we can see each of the directives begins with the # character. This is a signal to the preprocessor to interpret the subsequent keyword as a directive.

3 0
3 years ago
What is the Multiple Source Test
Goshia [24]
A source is where you can look to find info. Multiple means many or some. 

Therefore, a multiple source test is a test that you can find the answers in multiple sources, such as a book, article, journal, etc. 
7 0
3 years ago
Read 2 more answers
A search engine finds bugs and system failures in your computer.<br><br> True or False?
scZoUnD [109]
It is false search engine are used for searching for something
6 0
3 years ago
Read 2 more answers
What does a first line indent look like
algol13
If u mean the indent when you’re writing an essay, then it is an indent to show how u separate the paragraphs. Hope this helps.
5 0
3 years ago
Other questions:
  • What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
    11·1 answer
  • Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.
    7·1 answer
  • Which of the following sets of acronyms is concerned with encoding data for secure transmission?
    11·1 answer
  • 5. Which of the following views is used to run a PowerPoint presentation?
    11·2 answers
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    9·1 answer
  • Algorithm of how to calculate the area of a square.
    12·2 answers
  • Where is the third vanishing point in the three point perspective
    8·1 answer
  • Computer network reduces the cost. explain the statement with example.​
    8·1 answer
  • Tinh T = a1*a2*a3*...an<br><br> Giúp em với
    13·1 answer
  • Identify the calculation performed by the following code.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!