1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
4 years ago
15

Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a>=40)) b

=30; c=70; A. A = 40, b = 50, c = 70 B. A = 40, b = 30, c = 70 C. A = 40, b = 50, c = 60 Da = 40, b = 30, c = 60
Computers and Technology
1 answer:
AlekseyPX4 years ago
7 0

Answer:

a=40,b=30,c=60

The answer is B

You might be interested in
Explain how data is represent in the computer system
Alex Ar [27]

Explanation:

<h3>Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit, is the smallest unit of data in computing. It is represented by a 0 or a 1. Binary numbers are made up of binary digits (bits), eg the binary number 1001.</h3>

7 0
3 years ago
Start
Crank

Answer:

N=5  key task decision start and end

Explanation:

8 0
3 years ago
Cual es la relacion existe entre TENGNOLOGIA y la PRODUCCION DE ENERGIA
andrezito [222]

Answer:

la tecnología tiene energía para hacer que los dispositivos funcionen, que es como los humanos y la energía. Los seres humanos usan energía, ¡la tecnología también usa energía!

Explanation:

ps. this is in english, my home language

technology has energy to make devices work, which is like humans and energy. human beings use energy, technology uses energy too!

5 0
3 years ago
This goes to all of my friends who posted the "oh no i accidentally" questions lolll
bija089 [108]
Well thank you I think
6 0
3 years ago
Read 2 more answers
Which term describes unjust behavior due to a person’s gender or race? A. bias B. discrimination C. persecution D. stereotyping
Nady [450]

Unjust behavior due to someone's race or gender is B

discrimination

4 0
3 years ago
Read 2 more answers
Other questions:
  • 3) Write a program named Full_XmasTree using a nested for loop that will generate the exact output. This program MUST use (ONLY)
    6·1 answer
  • True or false? risk assessment should cover personnel, as well as technical support such as firewalls, secure operating systems
    13·1 answer
  • Makes it possible to distribute both power and data using ethernet cabling. select one:
    12·1 answer
  • Which of the following statements about certificates is true?
    14·2 answers
  • When working with copper cabling (as opposed to fiber optic) a ________ can check a variety of a cable's electrical characterist
    13·1 answer
  • Which of the following is not considered a system component that can be found inside a computer? A-CPU B-RAM C-PCIe graphics ada
    6·1 answer
  • Enumera 3 exemple de operatii de lucru cu elementele grafice 3D. Repede va rog dau coroana
    15·1 answer
  • There are 40 houses if company y provides electricity to 2/5 of the houses how many houses as company y provide electricity to
    5·1 answer
  • Josh is learning about hackers know for finding loopholes in systems, without notifying the company or organization beforehand.
    13·1 answer
  • "using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfe
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!