1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8090 [49]
3 years ago
6

Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the a

bsolute value of x, and the square root of (x * y to the power of z).
Output all results with five digits after the decimal point, which can be achieved as follows:
Put result to output with 5 decimal places
Ex: If the input is:
5.0 2.5 1.5
the output is:
55.90170 579.32402 5.00000 6.64787
Hint: Coral has built-in math functions (discussed elsewhere) that may be used.
Computers and Technology
1 answer:
nordsb [41]3 years ago
3 0

Answer:

The program is as follows:

float x

float y

float z

x = Get next input

y = Get next input

z = Get next input

Put RaiseToPower(x,y) to output with 5 decimal places

Put "\n" to output

Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places

Put "\n" to output

Put AbsoluteValue(x) to output with 5 decimal places

Put "\n" to output

Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places

Explanation:

This declares all variables

<em>float x </em>

<em>float y </em>

<em>float z </em>

This gets input for all variables

<em>x = Get next input </em>

<em>y = Get next input </em>

<em>z = Get next input </em>

This prints x^y

Put RaiseToPower(x,y) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints x^(y^z)

Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints |x|

Put AbsoluteValue(x) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints sqrt((x * y)^z)

Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places

You might be interested in
What can detect 8 colors?
Semmy [17]
The color sensor if i’m correct
8 0
3 years ago
Read 2 more answers
Which letters appear in the home row on a keyboard?
ZanzabumX [31]
C) A, S, D, F, G, H, J, K, L

The home row of keys are the keys which are in the middle of the keyboard. F and J have little bumps on them, which signify that they are the home keys. The home row is also where your fingers are meant to return when not typing.

5 0
3 years ago
Read 2 more answers
This is a quick and easy program that will let you practice the basics of the switch statement. You will ask the user to enter a
Nikolay [14]

Answer:

Explanation:

oof okay

5 0
3 years ago
What is procurement? Multiple Choice The purchasing of goods and services to meet the needs of the supply chain Includes the pro
fomenos

Answer:

The purchasing of goods and services to meet the needs of the supply chain

Explanation:

Procurement is usually associated with the buying of goods required to meet the need of the organisation.

The procurement department of any organizations is charged with the responsibility of purchasing goods and services for the organizations; they fill up whatever void is existing in the goods and services needed by the organisation.

6 0
3 years ago
Read 2 more answers
When an attacker attempts to gain access to a user's computer by stealing the encrypted file containing the password hash that w
-Dominant- [34]
Correct answer: Offline cracking

In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common approach (brute-force attack) is to try guesses repeatedly for the password and check them against an available cryptographic hash of the password.

The purpose of password cracking might be to help a user recover a forgotten password (installing an entirely new password is less of a security risk, but it involves System Administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords. On a file-by-file basis, password cracking is utilized to gain access to digital evidence for which a judge has allowed access but the particular file's access is restricted.

5 0
4 years ago
Other questions:
  • I have Mac(the last version installed) and I use Wine (application for using windows files, programmes on mac) but I have some p
    6·1 answer
  • _______ are special incentives or excitement-building programs that encourage consumers to purchase a particular product, often
    7·1 answer
  • In the Word 2016 window, where is the Status bar located?
    11·1 answer
  • Here is free points im leaving
    11·2 answers
  • Symbic Foods, a chain of fast food restaurants, has included a drop-down menu on its main Web site. With this drop-down menu, pe
    13·1 answer
  • A wireless networking technician has completed a survey of a wireless network and documented the detected signal strengths in va
    6·1 answer
  • Which of the following Web sites would be MOST credible?
    6·1 answer
  • What would a programmer use to stop a while-looping sequence and return to the beginning of the statement?
    11·2 answers
  • I cant tell if tubbo is a bee or a goat <br>or could he be human in the smp
    12·1 answer
  • 5. Javascript can be used for building apps and​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!