1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firlakuza [10]
3 years ago
11

Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate

type (such as including a .0 at the end of a double or quotes around a String).
4 + 1 + 9 + "." + (-3 + 10) + 11 / 3
8 + 6 * -2 + 4 + "0" + (2 + 5)
1 + 1 + "8 - 2" + (8 - 2) + 1 + 1
5 + 2 + "(1 + 1)" + 4 + 2 * 3
"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)
Computers and Technology
1 answer:
Masja [62]3 years ago
7 0

Answer:

(a)\ 14"."43

(b)\ 0"0"7

(c)\ 2"8 - 2"611

(d)\ 7"(1 + 1)"46

(e)\ "1"23"4"30"7"17

Explanation:

Required

Evaluate each expression

The simple rules to follow are:

(1) All expressions in bracket will be evaluated based on its data type

(2) Divisions will return only integer values

(3) Integers immediately after string values will be concatenated (not added)

So, the results are as follows:

(a)\ 4 + 1 + 9 + "." + (-3 + 10) + 11 / 3

Evaluate till a string is encountered

4 + 1 + 9 = 14

Followed by "."

Then:

(-3 + 10)   = 7

11/ 3 = 3

"." + (-3 + 10) + 11/3 = "."73 -- because expressions after string operations are concatenated.

So, we have:

4 + 1 + 9 + "." + (-3 + 10) + 11 / 3 = 14"."43

(b)\ 8 + 6 * -2 + 4 + "0" + (2 + 5)

Evaluate till a string is encountered

8 + 6 * -2 + 4 =0

"0" + (2 + 5) ="0"7

So, we have:

8 + 6 * -2 + 4 + "0" + (2 + 5) = 0"0"7

(c)\ 1 + 1 + "8 - 2" + (8 - 2) + 1 + 1

Evaluate till a string is encountered

1 + 1 = 2

"8 - 2" + (8 - 2) + 1 + 1 = "8 - 2"611

So, we have:

1 + 1 + "8 - 2" + (8 - 2) + 1 + 1 = 2"8 - 2"611

(d)\ 5 + 2 + "(1 + 1)" + 4 + 2 * 3

Evaluate till a string is encountered

5 + 2 =7

"(1 + 1)" + 4 + 2 * 3 = "(1 + 1)"46 --- multiply 2 and 3, then concatenate

So, we have:

5 + 2 + "(1 + 1)" + 4 + 2 * 3= 7"(1 + 1)"46

(e)\ "1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)

Since a string starts the expression, the whole expression will be concatenated except the multiplication and the expressions in bracket.

So, we have:

"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9) = "1"23"4"30"7"17

You might be interested in
Which statement uses the example type of context clue for the underlined word?
Usimov [2.4K]
I think the answer is C
8 0
3 years ago
Read 2 more answers
Misspelet errors are displays with a ...<br>.. below them<br>​
kkurt [141]

Answer:

The are displayed with red lines below them

3 0
3 years ago
Help pweaseee!! Lloyd has created a validation script for a data entry form. What property should he use to test for a selected
Talja [164]
I think it’s gonna be D. clicked
5 0
3 years ago
Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of
Anvisha [2.4K]

Answer:

import random

numbers = []

even = 0

odd = 0

for i in range(100):

   numbers.append(random.randint(1, 200))

for i in range(100):

   if numbers[i] % 2 == 0:

       even += 1

   else:

       odd += 1

print("Even:", even)

print("Odd:", odd)

Explanation:

Gg ez.

8 0
3 years ago
The function of the __________ is to on transmission assemble data into a frame, on reception disassemble frame and perform addr
iris [78.8K]

Answer: Media access control layer (MAC layer)  

Explanation:

The media access control layer is also known as MAC layer. The main function of the media access control layer is that it is used in the transmission of the data into the frame and perform the error detection and the address recognition which basically govern the accessing to the local area network (LAN) transmission medium.

The media access control layer is basically responsible for transmission of the data packets from NIC (Network interface card) to the another channel.

8 0
3 years ago
Other questions:
  • Suggest two other subtasks that may be performed in a dice game?
    15·2 answers
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • Consider the most important item among all the categories of information stored on your personal computer. As it applies to that
    8·1 answer
  • Consider the following code segment. int[] seq = {3, 1, 8, 4, 2, 5}; for (int k = 1; k &lt; seq.length; k++) { if (seq[k] &gt;=
    5·1 answer
  • This diagram shows a number of computing devices connected to the Internet with each line representing a direct connection.
    11·1 answer
  • Using an outline, how do you maintain your computer or cellphone​
    8·1 answer
  • What would give Lucy, an entry-level candidate, an edge over others while she seeks a programmer’s position? Lucy, an entry-leve
    11·1 answer
  • Use the drop-down menu to complete the steps for using the Goal Seek feature.
    13·2 answers
  • There are many potential risks associated with the internet. what do we call the distribution and access of illegal copies of di
    7·1 answer
  • Why is a salt added to a password that is being stored in a database?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!