1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
11

Driving is expensive. Write a program with two inputs, a car's miles/gallon and the cost of gas/gallon both represented as doubl

e variables, and output the total drive cost for 10 miles, 50 miles, and 400 miles, all on the same line, each separated by a single space.
Output each floating-point value with two digits after the decimal point, which can be achieved by executing the command
cout << fixed << setprecision(2); once before all other cout statements. That is done only once in the code before any cout stamtent.

Ps:(when i run the program it says this-
Enter miles per Gallon:
Gas cost for ten miles :-nan
Gas cost for fifty miles :-nan
Gas cost for four hundred miles:-nan
Computers and Technology
1 answer:
Nataly_w [17]3 years ago
6 0

Answer:33

Explanation:

You might be interested in
A computer's CPU and hard drive are found in the
Galina-37 [17]
A computers CPU and the hard drive are found in the system unit. The correct answer is C. <span />
8 0
3 years ago
Read 2 more answers
Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance
olchik [2.2K]

Answer:

A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration

Explanation:

Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are

RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.

4 0
3 years ago
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
solmaris [256]

Answer:

disable SSID broadcast and change the network name

Explanation:

Based on my experience with information technology and wireless networks my recommendation would be to disable SSID broadcast and change the network name. Disabling SSID will prevent the network name from appearing on devices that are searching for a network to connect to, and by changing the name it will also prevent anyone who knows the previous name from connecting unless they know the new name. Both of which will drastically increase security.

8 0
3 years ago
Which word-processing tool is useful for proofreading a document?
Mashutka [201]
The word-processing tool which is useful for proofreading a document is spell check. This will allow you to check the spelling of your text for you to edit the mistaken words.
7 0
3 years ago
Read 2 more answers
A(n) _____ is a request for the database management software to search the database for data that match criteria specified by th
olya-2409 [2.1K]

Answer:

Query

Explanation:

A query is the request form for accessing the data from a database to change it or retrieve it. It also permits the logic along with the information that we received in response

Here the data is to be search and that should be matched the criteria prescribed by the user

hence, the last option is correct

7 0
3 years ago
Other questions:
  • To decrease the size of text so it will fit into a text box without overflowing, select the
    14·2 answers
  • What statement best describes Konrad Zuse?
    6·2 answers
  • You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You w
    8·1 answer
  • What year did buck tooth bob become famous
    11·2 answers
  • You are the administrator of the Sybex website. You are working when suddenly web server and network utilization spikes to 100 p
    15·1 answer
  • The output for the following code will be: Pasta (1 mark)
    6·1 answer
  • 54 points!!! Cyber security
    14·1 answer
  • RTOS stands for ______ Time Operating System.
    11·1 answer
  • Consider the following statements regarding computer programs A - Variables can contain different values at different times.B -
    5·1 answer
  • Common names for computer-based information systems are transaction processing, management information, ________, and executive
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!