Write C11 statements that accomplish the following. (6, 7) a. Declare int variables x and y. Initialize x to 25 and y to 18

Answers

Answer 1

Answer:

int x, y;

x = 25;

y = 18;

Explanation:

Programming language: C++

This line declares both variables

int x, y;

This line initializes x to 25

x = 25;

This line initializes y to 18

y = 18;


Related Questions

how many years of prior experience in tech support do most MSP positions require?

Answers

Answer:

1

Explanation:

you need at least one year, (google says so)

For MSP positions, experience in tech support must have at least one year of prior experience.

What is tech support?

It is a service provided by a hardware or software company which provides registered users with help and advice about their products.

To work as a technical support, one must be experienced enough to understand the software and hardware complete terms.

Thus, most MSP positions require one year of prior experience.

Learn more about tech support.

https://brainly.com/question/6955119

#SPJ2

Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.

Answers

Answer:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

   print("You are old enough to drive. \n")

else:

   print("Still taking the bus, I see. \n")

   

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

   print("That is good to hear.")

elif(feel == "Sad"):

   print("I'm sorry to hear that. ")

else:

   print("Oh my!")

   

print("Tell me more. \n")

next=input("")

import random

r = random.randint(1, 3)

if(r==1):

   print("Sounds interesting. \n")

elif(r==2):

   print("That's good to hear. \n")

else:

   print("How unusual. \n")

print("Well, " + name1 + ", it has been nice chatting with you.")

Explanation:

This worked for me.

In this exercise we have to use the knowledge of computational language in python to describe a code, like this:

The code can be found in the attached image.

To make it easier the code can be found below as:

name1=input("What is your first name? ")

name2=input("What is your last name? ")

print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")

print("How old are you?")

age = int(input(" "))

print(str(age) + " is a good age.")

if(age >= 16):

  print("You are old enough to drive. \n")

else:

  print("Still taking the bus, I see. \n")

print("So, " + name1 + ", how are you today?")

feel=input("")

print("You are " + feel),

if(feel== "Happy"):

  print("That is good to hear.")

elif(feel == "Sad"):

  print("I'm sorry to hear that. ")

else:

  print("Oh my!")

print("Tell me more. \n")

See more about python at brainly.com/question/26104476

Each element in a dictionary has two parts: a key and a value. You use a key to locate a specific value.
a) True
b) False

Answers

Answer: TRUE

Explanation:

Elements in a dictionary are usually composed of two parts ; the key which could be viewed as the file name used to store the value. In general a dictionary written in the pattern; {key : value}. A certain value can be located, modified, deleted and added to a dictionary by using the dictionary key attached to each value in the dictionary object created. Each dictionary key should be unique and will be a string of letters which holds a particular value.

Paghambingin ang malawak na perspektibo sa

ang

limitadong perspektibo sa pamamagitan tatlong

eng lakas halimbawa.


Malawak


1

2

3


Perspektibo


1

2

3

Answers

Answer:

2

Explanation:

Paghambing limitadong perspektibo sa pamamag

There are three main categories of objects to be protected by access controls: information, technology, and _____________.

a. applications
b. processes
c. physical location
d. networks

Answers

Answer:

c. physical location

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device in order to grant or deny them access to a computer resource.

Access control work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials through a process known as authentication and granting the user access if the credentials provided are authentic (valid) through a process known as authorization, else, they would be denied access.

An example of an access control is a password because it is typically a basic and fundamental front-line defense mechanism against an unauthorized use of data or cyber attacks from hackers.

There are three main categories of objects to be protected by access controls: information, technology, and physical location. Information refers to all data sets, technology refers to the software applications, network and computer systems while physical location refers to infrastructures such as building, data centers, campuses, offices etc.

What is the best pokemon game?

Answers

Answer:

all of them

Explanation:

Answer:

i had the most fun playing omega ruby

Explanation:

Rafael needs to add a title row to a table that he has inserted in Word. What should he do?

Answers

Answer: C

Explanation:

Edge2020

Answer:

c

Explanation:

Why do schools block literally evrything?

Answers

Don’t know but butter dawg is better than school

Answer:

I'm wondering the same thing because I'm a pro at cool math games but don't know how to a arithmetic sequence

how can I write 3*3*3=27 in C langueg

Answers

Answer:

x³ - 27 = 0

-Astolfo

Jenny is preparing a presentation on the health statistics of the 10 most populated countries. She wants to apply a blinking effect to the names
of the countries, and a motion effect between the exit and entry of every slide. Which options should she use?
Jenny should use the v option to apply a special blinking effect to the names of the countries and the
option to
apply a motion effect between the exit and entry of every slide

Answers

Answer:

Jenny opens presentation software and insert data in slides

then, click on country names one by one and apply animations as you want, to apply animation on text. animation are occur in animation tab. Different type of animations are found in animation section such as blinking, fade , Wipe, Fly in etc.

After applying animations on country names

Secondly, You apply motion effect on exit and entry  of every slide.

Select slide on which you want to apply motion effect then click on Transitions tab and apply that motion effect as you want. the effect will apply on this slide.

If you want to apply same motion effect on all slide then you will first select all slide and then apply desire motion effect.  

The motion effect will apply on exit and entry of every slide.

Explanation:

Answer:

Jenny should use the Animation option to apply a special blinking effect to the names of the countries and the Transition option to apply a motion effect between the exit and entry of every slide.

List the name and purpose of twenty (20) different C++ commands.

Answers

Answer:

Drivers and help a new program to run

Which of the following best describes the purpose of an IP address?

Answers

Answer:

IP addresses provide a unique number for identifying devices that send and receive information on the internet

Explanation:

The IP address that best describes the purpose of an IP address is IP addresses provides a unique number for identifying devices that send and receive information on the Internet. The correct option is A.

What is an IP address?

An IP address is an address of the network of computers connected to the internet. The address is a sequence of numbers that are provided by the internet servers.

The full form of the IP address is internet protocol. It is the online address that is provided by the internet provider, The address will easily recognize if the person is using the internet. This address will be connected to the computers.

Therefore, the correct option is A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet.

To learn more about IP addresses, visit here:

https://brainly.com/question/18722788

#SPJ6

The question is incomplete. Your most probably complete question is given below:

IP addresses provide a unique number for identifying devices that send and receive information on the Internet

IP addresses assist in the reconstruction of a message that has been divided into many packets

IP addresses indicate the location where an internet-connected computing device was manufactured

IP addresses indicate how many times an individual packet has been requested by a router

According to Get2 College, which of the following can you receive text messages about as a high school senior?

Answers

Answer:

A scholarship

Explanation:

Are their ethical issues to consider when planning a database? For example, should personal data, such as medical information be stored in the same DBMS that manages employee salary and benefits data? Why or why not?

Answers

Answer:

Yes

Explanation:

When planning a database, we must actually consider legal implications.

Let's say, a database of salary and all benefits of every worker in a company. Every one who is a worker in this company, either senior or junior worker can access this information in this database.

But in a case of more personal information like medical information, it would be wrong to make it accessible to all who have access to the database. Because it may cause issues like misuse of personal informations of others. Such an information in the hands of a wrong person may be used against someone with serious health conditions.

If information are stored separately, then it won't be accessible by just anyone and it would be better for all workers as no one would possess any information he or she is not supposed to have.

Describe the mechanisms of ROT Cipher and Columnar Transposition. What can you do to break these ciphers?

Answers

The ROT cipher is a Caeser cipher where each letter is changed to its numerical value plus a pre-chosen number. This can be easily cracked using frequency analysis to determine how far the most common letters (like T or S or H) are being shifted. Columnar transposition can also be broken with a statistical method, but is much harder.

what is a compter software​

Answers

Answer:

Software, instructions that tell a computer what to do. Software comprises the entire set of programs, procedures, and routines associated with the operation of a computer system. ... A set of instructions that directs a computer's hardware to perform a task is called a program, or software program.

Computer software, or simply software, is a collection of data or computer instructions that tell the computer how to work. This is in contrast to physical hardware, from which the system is built and actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be really used on its own.

Hope this helps!!

what are the three component parts
of floating point number

Answers

Answer:

IEEE floating point numbers have three basic components: the sign, the exponent, and the mantissa. The mantissa is composed of the fraction and an implicit leading digit (explained below).

Explanation:

[tex]hii[/tex]hope this helps you ✌️

how can i hide my browsing history from internet service provider??? for free:)​

Answers

There are several technologies to hide your browsing history from an internet service provider. The most private is the Tor Network. You can install it from the Tor Project (just search the web to find it). Alternatively, you can try a VPN (will probably cost money) or a proxy (many are free, but often poorer quality).

Please mark as Brainliest!

answer:

yes! use any mobile vpn app (there are about 4 free ones) & that should block anyone including your internet service provider from knowing your location or what you do on your phone!

explanation:

hope this helped!

i answered your question & hope you have a great day!

pls give me brainliest <3

Write a program to compute the area of a circle some 'n' times. You must accept n and r from the user. Area is calculated using (22/7.0)*r*r - where r is the radius. Implement using value-returning functions. Hint: create a function to calculate area taking r as a parameter. In the main() function, ask for n and create a loop where you input r and invoke the area function n times.

Answers

In python:

def calculateRadius(r):

   return (22 / 7) * r * r

def main():

   quantity = int(input("How many times do you want to calculate the are? "))

   radius = float(input("What's the radius of your circle? "))

   i = 0

   while i < quantity:

       calculateRadius(radius)

       i += 1

if __name__ == "__main__":

   main()

I hope this helps!

What is the best way to describe eNotes?

A.it is a tool students can use to take notes during an online lesson

B.it provides access to an extensive back up system on the nternet

C.It allows students to clip a portion from a webpage for later use.

D.It is a tool for storing images and recordings in one location.​

Answers

Answer:

A.it is a tool students can use to take notes during an online lesson

Explanation:

ENotes is a tool used to take notes, particularly targeted towards online learners. Note-taking generally help students to possess a far better understanding of what they learn. It also helps the scholars to enhance their writing skills. There are many sophisticated and straightforward note-taking tools available on the market.

Answer:

(A) It is a tool students can use to take notes during an online lesson.

Explanation:

guys can u guys help me write the program plz

Answers

public class MyProgram{

   public static void main(String [] args){

       System.out.println("*****");

       System.out.println(" ****");

       System.out.println("  ***");

       System.out.println("   **");

       System.out.println("    *");

   }

}

That's all there is to it. I hope this helps!

Data becomes _______________ when it is presented in a context so that it can answer a question or support decision making.

Answers

Answer:

Information

Explanation:

Data becomes information when it is presented in a context so that it can answer a question or support decision making.

Data comes in raw forms which is as a result of studying a particular behavior or pattern over time.

By processing data, we are trying to get appropriate meaning from the raw forms that we have.

When we arrive at a conclusion based on these raw data, then we primarily have deduced information from the data

It is thus information that helps answer a question or appropriately support making of decisions

Create an IF function in which the logical_test argument determines if there are 8 or more seats. Use Yes for the value_if_true argument. Use No for the value_if_false argument. (If you type the formula, enclose the text arguments within quotation marks.)

Answers

Answer:

See explanation

Explanation:

To answer this question, I'll assume the following.

The application package is Microsoft Excel and the column with the seats is A1 (could be anything)

Hence: The IF Function is as follows;

=IF(A1 >= 8, "YES","NO")

Analyzing the above, we have:

=IF( --- This specifies the function

A1 >= 8,  --- This states the logical test

"YES", --- This represents the condition if true

"NO" --- This represents the condition if false

The IF function in Microsoft Office Excel is used to perform conditional operations.

The required IF function is: =IF(A1 >= 8, "Yes","No")

The syntax of an IF function is:

=IF([logical_expression],[value_if_true],[value_if_false])

Where

logical_expression represents the expression to comparevalue_if_true and value_if_false are the values that will be returned if the condition is true or false

From the question, we have:

The logical_expression is: A1 >= 8The value_if_true is "Yes"The value_if_false is "No"

Hence, the IF function is: =IF(A1 >= 8, "Yes","No")

Read more about Microsoft Excel formulas at:

https://brainly.com/question/2198360

is domain name system encrypted?

Answers

Answer:

they are all the same

Explanation:

all the packets look the same tis is because of HTTPS and HTTP/2, and how they both use connection

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!

What does the Address Resolution Protocol do?


transports packets, but does not include data reassembly

reports that a sender cannot be found

sends files across a network

finds the address of the next routing device along the network pathway

Answers

Answer: transports packets, but does not include data reassembly

Explanation: Hope it helps you!

Answer:

finds the address of the next routing device along the network pathway

Explanation:

srry its late

Xbox or Playstation? I wanna know why with a valid reason {:^)

Answers

There both good but playstation because on xbox you have to have a gamepass to play most games on there for ps4 you dont and the controllers don’t need batteries

Website managers use
every day.

Answers

Answer:

google

Explanation:

hsjsjwjwwjajakakaka

Functions can: A. Be used as building blocks to create new programs. B. Return a result to the caller function. C. Be reused any number of times. D. Do all of the above.

Answers

Answer:

D. Do all of the above.

Explanation:

Function: In computer science, the term "function" is described as a process in which it executes, then returns a specific value, and lastly resumes a particular program where the function has been called or initiated. Thus, in the "programming system," a specific named section associated with a program is present that is responsible for performing some specified tasks and is denoted as a "function". In other words, the function is referred to as a kind of routine or procedure.

In the question above, the correct answer is option-D.

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!
When is Internet Control Message Protocol most often used?


when Internet Protocol does not apply

when a receiver or sender cannot be located

when one needs to reassemble data sent via UDP

in the Network Access Layer

Answers

Answer:

d

Explanation:

because I did this before

Answer:

d

Explanation:

Thanks for ur time :)

Which of the following projects is most likely be used in STEM education to learn technology concepts?


test different sandbag materials that can help prevent flooding

analyze cleaning products to determine which ones are eco-friendly

investigate search engine criteria to improve search results

conduct a scavenger hunt to see who can find the most geometric shapes

Answers

Answer:

C.)

investigate search engine criteria to improve search results

Explanation:

I go to a STEM school, though the others are good options and are stuff we may do, they wouldn't help to teach technology concepts.

Other Questions
PLS HURRY!!! Which sentence shows an example of a reflexive pronoun? We built a snack bar to sell snacks to neighbors at the yard sale. I was so excited to try a new recipe for caramel popcorn. Suki made delicious lemonade and squeezed most of the lemons herself. Mauricio and Denise liked the frozen bananas, so we brought some to them. Bob's Gift Shop sold 650 cards for Mother's Day. One salesman, Josiah, sold 2% of the cards sold for Mother's Day. How many cards did Josiah sell? Which of the statements below is true?.A) 45 is 9 times as many as 5B) 72 is 8 times as many as 9C) 44 is 4 times greater than 11D) 63 is 7 times as many as 7E) 21 is 3 times greater than 9 marking brainleist if you do it quick and correct Why was Napoleon sent to Elba? How does a rock change into a metamorphic rock?A. evaporationB. cementation and compactionC. heat and pressureD. cooling of magma 1. What is the legislative branch of the federal government called? If 2000 ft of air is crossing an evaporator coil and is cooled from 80F to 60F, what would be the volume of air in ft exiting the evaporator coil? what ae the functions of the temporal lobe How do I find a ratio table that looks like this In the 1930s, unions gained which key protection for workers?guaranteed health insuranceretirement plans elder labor protectionsminimum wage Simplify the expression.4d+9-d-8 Find the equation of the line passing through (-7, 13) with a slope of -2. Write your answer in slope-intercept form. b8Help please!!!!!!!!!!!!!!!!!!!! If the ratio of pounds of apples to pounds of peaches sold at a farm stand is 3 : 4, which could be the pounds of apples and peaches sold?9 pounds of apples and 16 pounds of peaches.13 pounds of apples and 14 pounds of peaches.21 pounds of apples and 28 pounds of peaches.34 pounds of apples and 43 pounds of peaches. is this statement true or false the cowboy worked hard but earned thousands of dollars selling the cattle substitute x=3 into 3x-x Candy bars have increased in price by 8% in recent years. If today's price is approximately $1.60, how much was the original price of candy bars before the price Complete the equation for the horizontal line that passes through (11, 4).Y= What is 4 1/3 + 8 1/4