1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliina [53]
3 years ago
6

What is the value stored at x, given the statements:

Computers and Technology
1 answer:
iren [92.7K]3 years ago
5 0

Answer:

0.

Explanation:

Given

int x;

x=3/(int)(4.5+6.4)

Required

What is x?

The first line of the code segment declares x as integer. This means that, it will only hold non decimal numbers.

With the above explanation, options (a), (c) and (d) can not be true.

Solving further:

x=3/(int)(4.5+6.4)

The computer evaluates the denominator as:

x=3/(int)(10.9)

The denominator is then converted to an integer. So, we have:

x = 3/10;

3/10 = 0.3 but

Recall that: <em>x will only hold non decimal numbers.</em>

So:

x = 0;

You might be interested in
Smart phones and Smart watches are same functions due to?
Fantom [35]

Answer:Their motherboards,battery packs and circuits.

Mother boards are green tech plates that help connect and make a device work,they have sod (melted metal) to hold wires and buttons to it.

6 0
3 years ago
doubleIt is a function that takes one argument and returns no value . The argument is a pointer to int . The function doubles th
Mama L [17]

Answer:

void doublelt(int *number)

{

*number=*number*2;

}

Explanation:

This exercise is for you to learn and understand the PASS BY POINTER syntax. The importance of this is that if you didnt use a pointer you would have to RETURN an int from the function. in that case the code would be:

int doublelt(int number)

{

number=number*2;

       return number;

}

Passing by pointer manipulates the value by going inside the memory and where it resides. Without the pointer, the function would create COPIES of the argument you pass and delete them once the function ends. And you would have to use the RETURNED value only.

8 0
3 years ago
____ is a method of querying and reporting that takes data from standard relational databases, calculates and summarizes the dat
IgorLugansk [536]

Answer: Online analytical processing

Explanation:

Online analytical processing(OLAP) is the method through which multi-dimension analytical queries can be resolved.User can attain selected query data as per their selection and then assess and analyze them from different view point.

  • It helps in viewing and reporting , planning ,performing analytical calculation, collecting data in data cubes etc.
  • Other options are incorrect because data adjacency, Ad hoc reporting ,data segregation and E-discovery are not the mechanism through which query and storage of data in data cubes take place.
  • Thus, the correct option is online analytical processing
3 0
3 years ago
What is the advantage of using plenum cable for twisted-pair cable?
adell [148]

The advantage of using plenum cable for twisted- pair cable  is it is "Fire resistant"

<u>Explanation:</u>

Plenum cable is a cable that is used in plenum spaces of buildings. These cables have fire resistance characteristic with low smoke. These cables are self extinguishing, and never re-ignite. They require less space for installation and allows space for air circulation to be used by the HVAC system. Twisted-pair, coaxial, HDMI and DVI variants of cable are manufactured in the plenum version. Plenum cable is mandatory to be fixed in any "air handling" area.

7 0
3 years ago
A database program helps to ____________. A. Organize, send, and retrieve e-mails quickly b. Deliver elegant presentations to a
jarptica [38.1K]

Answer: D

Explanation: D. A database is software which is designed to store massive amounts of data and organize them in such a way that information can easily be worked on (added, deleted, moved, etc...).

7 0
3 years ago
Other questions:
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • Invalid length parameter passed to the LEFT or SUBSTRING function (below)".
    6·1 answer
  • Jessica has a balance of $2,200 on her credit card with an 18% interest rate. Her credit card company doesn’t require a minimum
    15·1 answer
  • What is a type of destructive program?
    8·2 answers
  • In a case where electrical current leakage from the circuit occurs, the GFCI would do the following:
    10·1 answer
  • How would you use Microsoft Excel to
    10·2 answers
  • Type in computer code for Sonic the Hedgehog, does it look weird yes or no
    15·1 answer
  • PLEASE ANSWER
    6·1 answer
  • When you started the vi editor, you forgot to specify the name for the new file you are creating. To save steps next time, how c
    14·1 answer
  • Can someone give me an earsketch song of summer to turn in
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!