1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
3 years ago
11

Ok for whoever answers this, Ill wager 20 points...

Computers and Technology
2 answers:
Novosadov [1.4K]3 years ago
8 0

Answer:

The display will be 17.

Explanation:

Tracing through the program:

At first, math is called and sent 1 and 2 - so 1 is stored to ans1 and 2 is stored to ans2.

If the user inputs 3 for a and 4 for b, the program then calls function math2 and passed values of 3 and 4.

So now inside of math2, 3 is stored to res1 and 4 is stored to res3. Inside of this function, res1 and res2 are added together - so then 7 is stored to d and then returned back to the original function.

So now 7 was stored back to the variable c. Then a and ans1 are added together (3 + 1 = 4) and b and ans2 are added together (4 + 2 = 6). Each of these values are stored back to e and f.

Then those values, e and f (4 and 6) are again sent to math2, which simply adds the values together and returns it back to the function. So 10 is sent back to math and stored to the value of g.

Then c (7) and g (10) are added together and displayed.

Temka [501]3 years ago
6 0

Answer:

The display will be 17.

Explanation:

You might be interested in
Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author'
lbvjy [14]

Answer:

Check the explanation

Explanation:

Pseudocode For Reading File:

start

Declarations

InputFIle records.txt

OutputFile result.txt

string authorName

string title

int numOfVol

open InputFile

open OutputFile

input authorName, title, numOfVol from records.txt

while not eof

output authorName

output title

output numOfVol

end while

close records.txt

close results.txt

END

The flowchart for reading the file can be seen below.

3 0
3 years ago
Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
konstantin123 [22]

Answer:

- Transform binary or unary M:N relationship or associative entity with its own key.

Explanation:

Transform binary relation is described as the method through which a decimal can easily be converted into binary while the unary relationship is described as a relationship in which both the two participants occurs from the same entity.

In the given case, 'transform binary or unary M:N relationship' can be created using 'the primary key linked with the relationship plus any non-key aspects of the relationship and the primary keys of the related entities' as it displays the existence of a relationship between the occurrences of a similar set of the entity i.e. associative entity here.

5 0
3 years ago
Serveral cheetas are growling at each other while hunting for animals.for which need are they competing?
SVEN [57.7K]

Answer:

prey

Explanation:

5 0
3 years ago
Which is the primary use of a word processor? create, edit, format, and print text-based documents maintain a database of record
qaws [65]
<span>Which is the primary use of a word processor? 
</span>
create, edit, format, and print text-based documents

------------------------------------------------------------------------------------------------

Hope This Helps :)

P.S
If you could mark me as brainiest that would be great! :D
3 0
3 years ago
someone please please help with this we have to make a sketch of a hydraulic spreader or cutter I chose the spreader now we have
AnnyKZ [126]

Answer:

heueururjrurh the best time to meet Vs t and get the use and may contain briy the best you had any y I have the same time ❤️ ry HR y regards Umesh he was a pleasure to have a great trip and u it

Explanation:

dgsisbsjdudb and I have a nice day best wishes for a few weeks back and I will send you an email from your NVR

8 0
3 years ago
Other questions:
  • About n processes are time-sharing the CPU, each requiring T ms of CPU time to complete. The context switching overhead is S ms.
    12·1 answer
  • What shooting position is commonly used when hunting with a shotgun?
    14·2 answers
  • What is the name of the organization responsible for assigning public ip​ addresses?
    13·1 answer
  • (Game Design) A float is a blank space, used as a placeholder in an array<br><br> True or false
    13·1 answer
  • Which of the following is NOT a function of the Web Accessibility Initiative​ (WAI)? A. Offering links to a variety of software
    10·1 answer
  • What is the difference between a sequential program and an event-driven program?
    9·1 answer
  • ____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
    7·2 answers
  • __________ is a growing practice in cooperative farmingassociations to pool and sell the fruit as a common commodity underthe br
    6·1 answer
  • Which option allows users to access the handout master to modify it?
    13·2 answers
  • SINCE I CANT SEE IT KANG LOOK
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!