1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
8

I get an error message on my code below. How can I fix it?

Computers and Technology
1 answer:
blondinia [14]3 years ago
8 0

Answer:

tempF = (tempC * 1.8) + 32;

Explanation:

Required

Correct the error in the program

The error is due to tempF not been initialized or being calculated

Correct the error by writing the formula for tempF before tempF was printed

<em>tempF = (tempC * 1.8) + 32;</em>

Writing the formula ensures that tempF is initialized with the expected equivalent value for tempC

You might be interested in
Identifying Responses and Replies
Brut [27]

Answer:

Identifying Responses and Replies by using the drop-down menus to complete the sentences about message response is written below in detail.

Explanation:

A situation like this may be:

Someone receives a bike. They travel it and all, and then all of an unexpected they fall and get injured

If you only understood the first section of how the person received a bike when you draft a response, you would only draft about that piece, but getting harm after receiving the bike is also a huge portion of the "story". You could draft like how you were so pleased when you received your first bike, but you wouldn't remember to address the time you got injured when you were riding down a hill or something.

7 0
3 years ago
Read 2 more answers
Of the listed principles, which process would transpire if a user provides a correct username and password?
kompoz [17]

Answer:

then the system will automatically grant access to that individual

Explanation:

Regardless of the system, a username and password are credentials used in order to prevent unauthorized access to the system. Therefore if a user provides the correct username and password when prompted, then the system will automatically grant access to that individual, since the account that they have logged in correctly as is already registered as an authorized account within the system.

5 0
3 years ago
In the formula =C5*$B$3, C5 is what type of cell reference?
Feliz [49]

Answer:

relative

Explanation:

i just got a 100 and it says its right on odsyware

8 0
3 years ago
Which of the following is a best practice for a strong password policy?
belka [17]

Answer:

Passwords must meet basic complexity requirements.

Explanation:

Password should contain:

  • Uppercase letters
  • Lowercase letters
  • digits (0 through 9)
  • special characters like @#$%^&*
  • minimum length of 8

Passwords should not contain:

  • user's name or surname
  • birth year/date
  • not similar to previous password
  • account/identity number
7 0
3 years ago
Do you think computers will be smarter than humans?
Andreas93 [3]

Answer: Yes, when we type something in, the computer will show you lots of things that a human can't think of. What i'm saying is, a computer thinks faster than a human.

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the following network: proxy-cache On average there are 35 objects downloaded per second, and the average object size i
    14·1 answer
  • 11What is the definition of bandwidth? the speed at which bits travel on the network the measure of the transfer of bits across
    7·1 answer
  • Henry is troubleshooting a network connection and wants to see if he can connect to the server on his network. Which Microsoft c
    14·1 answer
  • Public class Car {
    15·1 answer
  • The _____ document, created during the requirements-gathering and analysis phase of the systems development life cycle (SDLC), i
    9·2 answers
  • What is C.R.A.T systems used for?
    9·1 answer
  • The _______ of a secondary storage device indicates how much data the storage medium can hold.
    13·1 answer
  • What is the missing line of code?
    7·1 answer
  • Select all the correct answers.
    14·2 answers
  • Using complete sentences post a detailed response to the following.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!