1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bagirrra123 [75]
3 years ago
8

If x=50.7,y=25.3 and z is defined as integer z,calculate z=x+y​

Computers and Technology
1 answer:
ANTONII [103]3 years ago
3 0

Answer:

Ans: 76

Explanation:

z=x+y

=50•7 + 25•3

=76#

You might be interested in
The number 84 is divisible by 2,3,4 and 6. true or false
Eva8 [605]
84÷2=42. 84÷3=28. 84÷4=21. 84÷6=14. So your answer is true.
8 0
3 years ago
Read 2 more answers
Which of the following refers to a technology with a three-dimensional computer simulation in which a person actively and physic
weqwewe [10]

Answer:

B. Virtual reality

Explanation:

In a virtual reality context, the visual and auditory senses of the user are fed by data (images, sounds) from the computer using a goggle and earphones.  That allows the person to be totally cut off her real physical environment and be totally immersed into the world (reality) managed by the computer.

Not to be confused with<u> augmented reality</u>, where the physical reality and perception of it aren't changed... but an additional layer of information is added on top of it.  Like pointing your phone camera to a building and getting information about the building displayed on your phone.

7 0
3 years ago
Create a Produceclass that hasan instance variable of type Stringfor the name, appropriate constructors, appropriate accessor an
Nezavi [6.7K]

Answer:

you suck

Explanation:

5 0
3 years ago
In Python please.
Mazyrski [523]

Answer:

I dont know a lot about that but i know how to skeeo, i am reallyu good at sleeping.

Explanation:

7 0
4 years ago
Define types of hacker ?plz help me with this question​
denis-greek [22]

Answer:

the types of hacker attacks and techniques. White Hat Hackers. Black Hat Hackers. Gray Hat Hackers. Script Kiddies.

Explanation:

i don't know if this can help you

8 0
3 years ago
Read 2 more answers
Other questions:
  • What types of storage can be used to access data from another computer
    8·2 answers
  • Lesson 15: Integrated Literacy Connections Education Introduction to Computer Applications Unit 6: Internet Safety
    5·1 answer
  • NEED HELP ASAP! BRAINLIEST AND 20 PTS TO CORRECT ANSWER!
    14·1 answer
  • Describe one type of technology that is useful in producing images from space.
    9·1 answer
  • The "origin" of the cartesian plane in math is the point where x and y are both zero. Given a variable, origin of type Point-- a
    5·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • What is the best way to pay for college?
    9·2 answers
  • Who's hype for Halo Infinite?
    11·2 answers
  • MLB The Show 17, which simulates professional baseball games, and Madden Football, which simulates professional football games,
    5·1 answer
  • Select the correct answer.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!