1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
4 years ago
12

Write a C program that has the following statements: int a, b; a = 10; b = a + fun(); printf("With the function call on the righ

t, ");
Computers and Technology
1 answer:
mart [117]4 years ago
6 0

Answer:Following is the C program:-

#include <stdio.h>

int fun()//function fun of return type int and it returns value 6.

{

   return 6;

}

int main() {

  int a, b;

  a = 10;

  b = a + fun();//adds 6 to a.

  printf("With the function call on the right, ");

  printf("\n%d ",b);//printing b..

return 0;

}

Output:-

With the function call on the right,  

16

Explanation:

The function fun return the value 6 so it adds 6 to a and stores the result in b.

You might be interested in
During which phase of system development would you acquire any necessary hardware and software?
solmaris [256]

During the <u>design</u> phase of system development, you would acquire all the necessary hardware and software.

<h3>What is SDLC?</h3>

SDLC is an abbreviation for system development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality systems.

In Computer technology, there are seven (7) phases involved in the development of a system and these include the following;

  • Planning
  • Analysis
  • Design
  • Development (coding)
  • Testing
  • Deployment
  • Maintenance

Also, phased implementation simply refers to an implementation methodology in which smaller portions of functionality of a system are typically implemented one at a time (one after the other).

In conclusion, we can infer and logically deduce that you would acquire all the necessary hardware and software during the <u>design</u> phase of system development.

Read more on phases here: brainly.com/question/7112675

#SPJ1

3 0
2 years ago
What file name would allow you to easily find and edit your document later in Word Online?
DIA [1.3K]
The first one “ jane_essay 2_24_21 “
6 0
3 years ago
Read 2 more answers
_______ is a very common approach to multisystem authorization.
mart [117]

Password is a very common approach to multisystem authorization. Passwords can be made up of a combination of letters, numbers, and special characters.

Anyone who has used a computer knows how to use a password, which is the most commonly used authentication method. Password-based authentication is the most simple for adversaries to exploit. Passwords are frequently reused, and guessable passwords are created using dictionary words and publicly available personal information. Two-factor authentication (2FA) is a security system that requires two distinct forms of identification to gain access to something. The first factor is usually a password, and the second is usually a text message with a code sent to our smartphone, or biometrics such as your fingerprint, face, or retina.

Learn more about password here-

brainly.com/question/14580131

#SPJ4

7 0
1 year ago
How do you create a IOS app?
Ivahew [28]
I would use x code and watch tutorials on how to code on youtube
5 0
3 years ago
A web application that is designed as a single piece of software with multiple features that are fully integrated into the main
Nookie1986 [14]

Answer:

c. Service oriented architecture (SOA)

Explanation:

In a service oriented architecture (SOA), a component of an application provides services to other components of the application or other applications majorly via a communications protocol over a network. In other words, SOA is a programming or software development technique in which services communicate with each other across different platforms.  

One key principle of SOA is to design an application (which in itself is a piece of software with multiple features) that is independent of any product, service, vendor or technology but can be integrated into other applications. SOA makes use of loose coupling -  a technique in which a client service remains independent of another service that requires it.

In contrast, a monolithic architecture aims at developing a software that is self-contained, independent and not to be integrated into other applications.

On another hand, Software as a service (SaaS), though a bit similar to SOA, is a model in which an application is made available to customers basically through a network. Users basically access the application via a browser.

Therefore, the best option is

C. Service oriented architecture.

3 0
3 years ago
Other questions:
  • In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
    5·1 answer
  • What type of traffic always goes to all devices in a subnet?
    10·1 answer
  • Technological progress has reduced the cost of manufacturing mp3 players. what happens if demand is unchanged?
    9·1 answer
  • A technician attempts to run an executable file on a Linux computer but receives a Permission Denied message.
    11·1 answer
  • What is a System Software ?
    11·2 answers
  • Which kind of results will appear using the search query "Frosty the Snowman" in quotation marks?
    6·1 answer
  • William created a spreadsheet and he would like to enter the data he collected. What information should he put in the first row?
    15·1 answer
  • Dora has inserted a text box into a Word document that she is formatting. Which strategy will not format text boxes? Create a li
    6·2 answers
  • What is the best description of a raster image?
    10·1 answer
  • Please tell me which ones go into which categories no files!!
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!