Answer:
// here is code in c++ to find the approx value of "e".
#include <bits/stdc++.h>
using namespace std;
// function to find factorial of a number
double fact(int n){
double f =1.0;
// if n=0 then return 1
if(n==0)
return 1;
for(int a=1;a<=n;++a)
f = f *a;
// return the factorial of number
return f;
}
// driver function
int main()
{
// variable
int n;
double sum=0;
cout<<"enter n:";
// read the value of n
cin>>n;
// Calculate the sum of the series
for (int x = 0; x <= n; x++)
{
sum += 1.0/fact(x);
}
// print the approx value of "e"
cout<<"Approx Value of e is: "<<sum<<endl;
return 0;
}
Explanation:
Read the value of "n" from user. Declare and initialize variable "sum" to store the sum of series.Create a function to Calculate the factorial of a given number. Calculate the sum of all the term of the series 1+1/1!+1/2!.....+1/n!.This will be the approx value of "e".
Output:
enter n:12
Approx Value of e is: 2.71828
Answer:
They allow you to ask more questions and also your rank goes up or down.
Explanation:
Answer:
SUMIFS
Explanation:
As we know that the excel is used to present the data in a very attractive way by applying the formulas, pie charts, functions as a pivot table, goal seeking, macros, etc
In order to determine the total sales for each and every sales person, production and location combination we use the SUMIFS function so that the total of each column could come in an easiest and better way
Answer:
Program Comments
Explanation:
program comments are explanations. They are not executable code and the can actually appear anywhere in your code. Their main function is code documentation for the future. In Java programming language for example three types of comments is used. These are
// Single line comments (This starts with two forward slashes
/* Multiple Line
comment
Style*/
The third is the javadoc that gives a description of a function. I looks like the multiple line but is has two asterics
/** This is javadoc
comment
style*/
Answer:
The correct answer to the following question will be "Secure".
Explanation:
This file includes information about the rights of verification and authorization.
- It will be used primarily for monitoring the use of authorization schemes.
- It holds all communications related to safety like faults in encryption.
- This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.
So, it's the right answer.