1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sergeeva-Olga [200]
3 years ago
11

1.) Write the formula, which assigns double x to double n raised to the double z power.

Computers and Technology
1 answer:
andrezito [222]3 years ago
3 0

Answer:

1.) Write the formula, which assigns double x to double n raised to the double z power.

Answer: 2\times x → 2\times n^(2\times z<u>)</u>

2.) Write a formula, which will add 5 to the cube of double t times double n, and assign it to double x.

Answer: 5\plus 2\times t^3→2\times x

3.) Write a formula, which will assign double x to square root of the sum of the squares of the lengths of the two legs of a triangle. Declare double leg1, and double leg2, in order to find the hypotenuse. (Pythagorean Theorem)

Answer: 2\times x → \sqrt \{(l^2)_1 + (l^2)_2\}= hypotenuse

4.) Write a program that find the distance between two values on the number line by taking the absolute value of their difference. Assign the answer to double x. The two numbers have been declared as follows:

double num1, num2

Answer: length = \sqrt\{|num2 - num1\|} → 2\times x

Explanation:

.

You might be interested in
PLS HURRY!!!<br> Look at the image below!
max2010maxim [7]

Answer:

Ctrl+c

Explanation:

6 0
3 years ago
Read 2 more answers
____ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various
gregori [183]

Answer:

E. Genetic algorithms

Explanation:

In Computer science, Genetic algorithms are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathematical models, and comparing the mutated models to search for a best alternative.

6 0
3 years ago
Write a for loop to populate array userGuesses with NUM GUESSES integers. Read integers using Scanner. Ex If NUM GUESSES is 3 an
inn [45]

Answer:  

import java.util.Scanner;  

public class StoreGuesses {  

  public static void main (String [] args) {  

      Scanner scnr = new Scanner(System.in);  

      final int NUM_GUESSES = 3;  

      int[] userGuesses = new int[NUM_GUESSES];  

      int i = 0;  

     

      for (i = 0; i < NUM_GUESSES; ++i){  

          userGuesses[i] = scnr.nextInt();  

      }  

      for (i = 0; i < NUM_GUESSES; ++i){  

          System.out.print(userGuesses[i] + " ");  

      }  

  }  

}  

/*

Output:

2 4 6  

2 4 6  

*/

7 0
3 years ago
An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chose
boyakko [2]

Answer:

An internal schema                                                            

Explanation:

  • The internal schema refers to the physical storage structure of database.
  • It refers to the lowest level of abstraction.
  • This is also called physical schema.
  • It contains multiple instances of multiple internal records.
  • It provides information about the representation of the whole database that what data is stored in DB and in what form e.g the data is stored in the records form on the disk.
  • This schema gives detailed description of internal model which involves storage structure of the database, representation and classification of stored data. This format of data is only understandable by the Database management system.
7 0
3 years ago
Which software development team member would make the most use of the tool, Load Runner?
sveta [45]
Given that Loadrunner is a software testing tool, I'm assuming that the software development team member who would make the most use of that tool is A. a software engineer, because that is the person who creates software and then tests it. 
4 0
3 years ago
Other questions:
  • What is the name of a computer or application program that intercepts user requests from the internal secure network and then pr
    11·1 answer
  • What kinds of messages can computers read? (CodeHS)
    7·1 answer
  • Storing a value in a variable<br> Exponent<br> Variable<br> Assignment<br> Operator
    13·1 answer
  • What is the description of a computer ram?
    7·1 answer
  • If you’re paid hourly and work 40 hours in one week how much overtime have you worked? 8 hours none $48 or $80
    9·2 answers
  • How do I turn on your asus chromebook flip?
    12·1 answer
  • Which C99 function can be used to convert a string to a double?
    15·1 answer
  • One key criterion for selecting social networks is the number of daily visitors to the website. when comparing linkedin traffic
    7·1 answer
  • What is a command-line program?
    8·2 answers
  • Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!