1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lera25 [3.4K]
3 years ago
5

What is the output?

Computers and Technology
1 answer:
Vinvika [58]3 years ago
4 0

Answer:

20

Explanation:

You might be interested in
Part of an algorithm which is repeated for fixed number of times is classified as.
AleksandrR [38]

The part of an algorithm which is repeated for a fixed number of times is classified as iteration.

Iteration is basically a repeated execution of the same set of instructions in sequence until a certain condition is met.  For loop is the type of iteration in which a block of instructions repeated again and again for the fixed number of times. Upon completion of the previous iteration, the next iteration starts. The iteration process stops only when the given termination condition matches.

For example, this is the syntax of for loop:

for(initialize; condition; increment);

for (int num=0; num<5; num++)

In this for loop, iteration is carried out for 5 times, starting the value of num from 0 and repeatedly iterates with an increment of one in num until the value of num is less than 5 i.e. 4. This loop terminates once the value of num becomes 5 and, in result the condition num < 5 fails to match anymore.

Therefore, the part of an algorithm which is repeated for fixed number of times is classfied as iteration.

You can learn more about itreation at

brainly.com/question/28134937

#SPJ4

7 0
1 year ago
Xavier buys a new laptop for $540. He makes a down payment $75 and pays the rest in 6 equal monthly payments, p. What equation r
mylen [45]

Explanation:

so you want to subtract 540-75=465

so 465 is what he has to pay total so now we break it up into equal parts

465/6=77.5

so he would pay $77

3 0
3 years ago
The file descriptor stderr is represented by the number ____.
enyata [817]
Stderr is 2. stdin is 0, stdout is 1.
5 0
3 years ago
A(n _______________ is a pre-written formula that is built into excel
nevsk [136]
<span>A function is a pre-written formula that is built into excel.
There are many functions which are pre-written into excel.
Some examples are the SUM function which adds the values in a given range. The AVERAGE function takes the average of values in a given range, etc.
</span>
8 0
3 years ago
If there is a circuit that is being used 36 CCS then how much of that circuit is being used in Erlang?
Mkey [24]

Answer:

A.1.

Explanation:

CCS(Centum Call Seconds) is a unit to measure the network traffic in the telecommunication circuit network.        

1 Traffic unit = 1 Erlang.      

The relation between Erlang and CCS(Centum Call Seconds) is:-

36 CCS = 1 Erlang.          

Hence the answer to this question is 1 Erlang.

5 0
3 years ago
Other questions:
  • Test if a password entered is correct. The secret phrase is Ada Lovelace. Sample Run 1 Enter the Password: Ada Lovelace Sample O
    13·1 answer
  • It is important that researchers design rigorous study methods to eliminate: a. inferences. b. the need for a CONSORT flow chart
    10·1 answer
  • All digital images are made up from varying rectangles of color, called _____________.
    6·2 answers
  • What is the keyboard shortcut Ctrl+Z used for?
    14·2 answers
  • Gemima wants to show the amount of vitamin C a fruit salad contains in the blue cell of the table below. To do this, she needs t
    9·2 answers
  • It is an attribute that must be used in the form tag in specifying an input file type
    9·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • A web application with an SQL server database is found to be compromised by an attacker. On examination, the email IDs of the da
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!