1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
8

7.4 Lesson Practice (projectstem): what is output if the user is enters 2?​

Computers and Technology
1 answer:
Hatshy [7]3 years ago
3 0

Answer:

18

Explanation:

lets go step by step.

the function called tryIt has a value, a variable named "a". this "a" variable will be whatever the user enters when the program says, Enter a number.

ok so if we enter "a" as 2, and b in the function will always be 7, and 2 + 7 equals 9,

and the ans variable (short for answer) will take the result of the function (9) and multiply it by 2,

then the answer is 18

You might be interested in
. _______ view focuses on the text and content of a document, without much information on the page layout.
Georgia [21]
Read view
It allows to hide all instrument panels
5 0
3 years ago
What is the advantage of using a high-level language over machine language for writing computer programs?
Sveta_85 [38]

Answer:

B.  is easier to write programs

Explanation:

High-level languages are most commonly used languages these days. The ease of understanding and writing programs in high-level language has made them very popular. High-level languages are near to human. English words are used to write programs in these languages. So option B is the correct answer..

6 0
3 years ago
Read 2 more answers
What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only o
Yuki888 [10]

Answer:

The Security Account Manager

Explanation:

The Security Account Manager (SAM), This is a database file found in Windows Operating Systems.... Windows XP, Windows Vista, Windows 7, 8.1 and 10 that stores users' passwords. It can be used to authenticate local and remote users. It is  an important and vital component of how Windows stores passwords locally on the computer.

5 0
3 years ago
With magnetic readers being rendered inefficient for security, what are in most debit and credit cards now to enhance security?
Lena [83]
It’s RFID because they didn’t have enough money
7 0
3 years ago
This project was used to drive the VR Robot to number 25 on the Number Grid
Ludmilka [50]

Answer:

B Wait until position y in millimeter should be greater than 500 at least im guessing because you didnt add what the map looked like, making my job MUCH harder

Explanation:

3 0
3 years ago
Other questions:
  • Assume that word is a variable of type String that has been assigned a value. Assume furthermore that this value always contains
    13·2 answers
  • (a) Implement (in Java) the RadixSort algorithm to sort in increasing order an array of integer keys.
    10·1 answer
  • IT investments can lead to developing IT capabilities and dynamic IT competencies, which can lead to achieving the following six
    5·1 answer
  • To defragment a disk means to ____. slow it down, diagnose problems with it, reorganize it, repair it
    8·1 answer
  • Which shortcut key aligns text to the center of the paige
    5·1 answer
  • 13) An-Excel-file-is-generally called-a-l-an:
    6·1 answer
  • Examples of system software include operating systems like macos, Linux, Android and
    10·2 answers
  • What is the role of computer in modern problem solving​
    13·1 answer
  • What can a user do using the Contact Group dialog box? Check all that apply.
    10·2 answers
  • Who can give me answer for this kinda urgent pls
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!