1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serggg [28]
3 years ago
12

The following program is suppose to use the sin() function in the math library and write out an input's absolute value over an i

nterval. So for example if sine(0.6) is 0.564 then its absolute value is the same (0.564). But if sine(2.4) is -0.675 then its absolute value is 0.675. #include #include /* has sin(), abs(), and fabs() */ int main(void) { double interval; int i; for(i = 0; i <30; i++) { interval = i/10.0; printf("sin( %lf ) = %lf \t", interval, abs(sin(interval))); } printf("\n+++++++\n"); return 0; }
Computers and Technology
1 answer:
Elza [17]3 years ago
3 0

Answer:

#include <stdio.h>

#include <math.h> /* has sin(), abs(), and fabs() */

int main(void) {

   double interval;

   int i;

   for(i = 0; i <30; i++) {

       interval = i/10.0;

       printf("sin( %.1lf ) = %.3lf \t", interval, abs(sin(interval)));

   }

   printf("\n+++++++\n");

   return 0;

}

Explanation:

The C source code defines a void main program that outputs the absolute value of the sine() function of numbers 0.1 to 3.0.

You might be interested in
An application team plans to follow the 10-phase SDLC model. After the team identifies both functionality and security requireme
Valentin [98]

Answer:

The team did not adequately formalize the software's design

Explanation:

The most logical reason for this confusion is the fact that the team did not adequately formalize the the software design.

The design approach has to do with clearly defining the architectural modules of the application. The requirements in the software requirement specification document would serve as input for the next phase. The documents are prepared and they give a definition of the overall system architecture.

The team got confused because they did not go through this phase of the 10-phase SDLC model.

3 0
3 years ago
What does the acronym OSHA stand for? A. Occupational Safety and Health Administration B. Occupational Safety and Human Activiti
poizon [28]
The answer is A. Occupational Safety and health Administration.
4 0
3 years ago
Read 2 more answers
Give a tight bound on the number of times the z = z + 1 statement is executed. i = 2 while ( i &gt; 1 ) { i = floor(i/2) z = z +
Alinara [238K]

Answer:

zero ( 0) times.

Explanation:

In the code;

i = 2

while ( i > 2){

     i = floor( i/2 );

     z = z + 1;

}

the variable " i " is assigned the integer " 2 ", then the while statement loops with a condition of a greater " i " value and divides the value by two for every loop.

But in this case, the while statement is not executed as the value of " i " which is 2 is not greater than but equal to two.

4 0
3 years ago
Where is the spell checker found in excel?
fenix001 [56]
Except keyboard of F7 and Spell Checkbutton in toolbar, you are also able to apply Spelling check command fromExcel 2007/2010/2013/2016 Ribbon: Click the Review tab; Go to Proofing group; Then you will view the Spellingbutton , that's Spell Check command.



hope this helps
5 0
4 years ago
Read 2 more answers
Alexi is writing a program which prompts users to enter their race times without decimals. Which function should she use?
Juli2301 [7.4K]

Answer:

It's either B or C

Explanation:

I saw this on another brainly but they said it wasn't print so id say b is most likely

6 0
3 years ago
Read 2 more answers
Other questions:
  • What type of socket should be used with an air impact wrench
    12·1 answer
  • Discuss the different types of user-friendly interfaces and the types of users who typically use each.
    12·1 answer
  • Which is a circuit board located behind an LCD screen on a laptop?
    7·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • Several NEC® sections contain the requirement to size conductors and overcurrent devices at 100 percent of the noncontinuous loa
    15·1 answer
  • What is the code for this please?​
    13·1 answer
  • Any looping construct can be nested inside another loop is known as
    11·1 answer
  • The space that helps you organize your PowerPoint or Web Page is called ______.
    13·1 answer
  • Anyone who do bug bounty hunt ?​
    10·1 answer
  • _______________________ variables do not need to be declared inside the function definition body, they get declared when the fun
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!