1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olya-2409 [2.1K]
3 years ago
6

Using functions,

Computers and Technology
1 answer:
ZanzabumX [31]3 years ago
8 0

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

int main()

{

double h, w;

int s, a, b;

cout<<"height in feet: ";

cin>>h;

cout<<"width in feet: " ;

cin>>w;

cout<<"tile size in inches:";

cin>>s;

int height = h*12;

if(height%s==0)

a = height/s;

else

a = height/s + 1;

int width = w*12;

if(width%s==0)

b = width/s;

else

b = width/s + 1;

cout<<"Number of tiles: "<<a*b;

}

You might be interested in
In word, the ____ presents the most accurate view of how your document will look when printed, displaying the entire page on scr
makkiz [27]
<span>When using Microsoft Word, the "Print Preview" presents the most accurate view of how the document will look when it is printed. When using "Print Preview" the entire page is displayed on screen, making it easier to see what adjustments should be made to the page layout, such as spacing or text size.</span>
7 0
3 years ago
Which of the following is NOT an algorithm?
Nata [24]

Answer:

d) rolling a pair of dice in monopoly

Explanation:

an algorithm is a process or set of rules followed in a particular order to perform a certain task. all of the other answers are a set of instructions that lead to something except for rolling a pair of dice. rolling a pair of dice can be a part of instruction but its not a process in itself.

hope this makes sense!

3 0
3 years ago
What can save a computer from damage by sudden increases in voltage?
Simora [160]
Surge protector :) hope this helps
7 0
3 years ago
What type of servers are used to store recently accessed DNS records from other domains to avoid incurring the performance overh
Kruka [31]

The correct answer is B. Primary DNS Server.

DNS records are type of data that is equivalent to IP address where the website or domain is located.  DNS records are normally stored in DNS server in a raw or flat file. A host, using port number 53 will send a DNS request to the server. If the computer has stored it's data or record in it's database, it will automatically reply to the requesting host. Example: You typed in www.website.com, if you have a matching DNS record in your server, using an IP address, your server will reply and display the website.

8 0
3 years ago
The internet backbone is a foundation network linked with _____ that can support very high bandwidth.
slava [35]
The internet backbone is a foundation network linked with fiber-optic cables that can support very high bandwidth. Fiber-optic cables can be compared with an electrical cable because they use the fibers to carry light and transfer information. The fiber-optics within a network help the information travel through the bandwidths at a fast, clear speed. 
8 0
3 years ago
Other questions:
  • One of the disadvantages of cable technology is that:
    7·1 answer
  • which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
    6·1 answer
  • You are preparing to program a replacement system board, but the "system is booting in mpm mode" message is not displayed. what
    10·2 answers
  • What may happen if a large number of computer users are attempting to access a web site at the same time that you are
    9·2 answers
  • What type of interview would be most likely for the following scenario?
    11·2 answers
  • Demote the "Arrive and leave at the same time each day." List item, and then promote the "Respect" list item.
    6·1 answer
  • What is the difference between a manufacturing engineer and a materials engineer?
    7·2 answers
  • Social media challenges third world country are facing​
    8·1 answer
  • Need the answer ASAP!!!
    14·1 answer
  • A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!