What will print to the console after running this code segment?


A. 15.

B. 16.

C. 18.

D. 21.

What Will Print To The Console After Running This Code Segment?A. 15.B. 16.C. 18. D. 21.

Answers

Answer 1

Answer:

16

Explanation:

answer =3+2

answer =5+3

return 8 × 2

Answer 2

16 will print to the console after running this code segment. Therefore, option B is correct.

What do you mean by code segment ?

A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.

A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.

In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.

answer = 3+2, answer = 5+3

return 8 × 2

= 16

Thus, option B is correct.

To learn more about the code segment, follow the link;

https://brainly.com/question/20063766

#SPJ2


Related Questions

Rohan has 50,000 that he wants to invest in two mutual funds for one year. Func low risk fund with 18% interest rate and Fund B is a higher risk fund 1% interest rate. Which feature of spreadsheets (Calc) will be help him to decide } Solver (b) Subtotal (c) Linking sheets d) Macros​

Answers

The feature of spreadsheets that will help Rohan decide where to invest his money is;

Option A; Solver

Since he wants to find where to invest his funds for one year between the two fund types. This means in excel, he will make of what we call "IF function".

The "IF" function helps in making logical comparisons between a particular value and what you will expect and as a result, it implies that the "IF" statement can have two results.

The first result of the IF function will be the one to show that the comparison is True while the second is to show the comparison is False.

Now, in Microsoft Excel, we make use of an add-in program called "SOLVER" that is used for what-if analysis.

Solver is used to find the maximum or minimum value for a formula in the objective cell which is subject to constraints, on the values of other formula cells in that particular worksheet.

Read more at; https://brainly.com/question/15032995

Lists can not hold strings and numbers in the same list.
True
False

Answers

i think it is false??

The command used to save a file for the first time and or to save a file with a new file name, location and formatT

Answers

cntrl s dummycntrl s dummycntrl s dummycntrl s dummycntrl s dummy

When worksheets are grouped together you can change and create consistent _______ in all of the worksheets.

Answers

When worksheets are grouped together, it's possible for the user to change and create consistent formatting in the worksheets.

It should be noted that if an individual group a set of worksheets, then any changes that is made in the worksheet will have an impact on the other worksheet.

Therefore, when worksheets are grouped together, it's possible for the user to change and create consistent formatting in the worksheets. For example, if an individual wants to create a standard table, grouping them can help save the user a lot of time.

Read related link on:

https://brainly.com/question/25612069

which of the following are benefits of designing a scalable system? choose 3 options.

-guaranteed systems access for all users

- users may never know that a site has experienced tremendous growth

- ability to respond to user volume issues more quickly

- system will never need to grow again

-ability to maintain a high level of service for customers ​

Answers

I asked my brother since he’s kinda of tech geek and he said

The 1st, 3rd, and 5th answers are correct

Hope this helps and I hope my brother is not wrong.

If you suspect cyber crime what do you u do?​

Answers

Answer:

Hey mate.....

Explanation:

This is ur answer.....

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Hope it helps!

Brainliest pls!

Follow me! :)

Answer:

I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.

Explanation:

__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

Answers

Answer:

bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.

What are the revised versions of water grinding mill and horse cart

Answers

What are the revised versions of water grinding mill and horse cart

ANSWER

A watermill or water mill is a mill that uses hydropower.

It is a structure that uses a water wheel or water turbine to drive a mechanical process such as milling (grinding), rolling, or hammering. Such processes are needed in the production of many material goods, including flour, lumber, paper, textiles, and many metal products.

These watermills may comprise gristmills, sawmills, paper mills, textile mills, hammermills, trip hammering mills, rolling mills, wire drawing mills.

What in a database table is an item of information with some characteristics?

Answers

Answer:

Attributes describe the characteristics or properties of an entity in a database table. An entity in a database table is defined with the ‘fixed’ set of attributes. For example, if we have to define a student entity then we can define it with the set of attributes like roll number, name, course.

Explanation:

CAN I GET BRAINLIEST

Which career path involves working directly with computer networks?

Answers

The career path involves working directly with computer networks are analyst, network manager, and data analyst.

What are Networking?

Networking may be uncomfortable and nearly painful for a few people, however, it is something we have to all do. The truth stays that networking debts for kind of 70 percent of jobs landed via way of means of activity seekers.

Computer networking specialists are in demand, in keeping with a have a look at completed via way of means of IT Career Finder, community administrator activity is ranked in pinnacle 10 positions.

Read more about the networking :

https://brainly.com/question/1027666

#SPJ1

Answer: Computer systems administrator

Explanation:

The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.

Answers

Answer:

url

Explanation:

which of these is not enumerated as a motivation to create accessible web content?

Answers

Answer:

Which of what?

Explanation:

From a data modeling point of view, _____ data refer to data whose values change over time and for which one must keep a history of the data changes.

Answers

Answer:

From a data modeling point of view, time-variant data refer to data whose values change over time and for which one must keep a history of the data changes.

SOMEONE WHO ACTUALLY KNOW HOW TO DO THIS PLEASE DO IT AND SEND A SCREENSHOT I REALLY NEED IT FOR MY EXAMS AND DONT TROLL ​

Answers

What computer do you own?

What is the purpose of formatting charts?
changes the data set used for creating the chart
changes the look and feel of the display
changes the values in the data set
changes the type of chart used
Intro
Don

Answers

Answer:

Changes the look and feel of the display

Explanation:

Because you don't change the data nor the values in the char

And it does not change the type of chart.

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.

Answers

Answer:

Telemedicine refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other. Modern technology has enabled doctors to consult patients by using HIPAA compliant video-conferencing tools.

Explanation:

Lauren is a network technician monitoring performance on the local area network (LAN). She becomes alarmed when the network utilization reaches 95 percent for a particular time of day. How does she know what the utilization is normally like

Answers

It uses network usage monitoring software to know the level of traffic on that local network.

We can arrive at this answer because:

Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.

To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.

More information:

https://brainly.com/question/8118353

What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device

Answers

the smallest unit of data in a computer is bit

In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today

Answers

Answer:

Maturity

Explanation:

John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat

Answers

Answer:

Evil Twins Attack

Explanation:

When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.

quadratic equation 4

Answers

In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.

HOPE IT HELPS:)

Why is RAM considered as a volatile memory?​

Answers

RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......

Read only memory is primarily used for?

Answers

Answer:

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM.

Hope This Helps!!!

A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

Answers

Answer:

An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.

when trying to solve a problem, bret uses a logical, step-by-step formula called

Answers

The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.

An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.

This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.

In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.

Read more on algorithm here: https://brainly.com/question/24793921

The ____ method constructs a text string from Unicode character codes that are passed as arguments.

Answers

Answer:

The fromCharCode() method constructs a text string from Unicode character codes that are passed as arguments.

a ____________ is the intersection of a column and row in an excel spreadsheet.

Answers

Answer:

a cell is the intersection of a column and row in an excel spreadsheet.

1. how did the prototype help you think about your idea?
2. what was frustrating about making a prototype?

Answers

[tex] \: \: \: \: \: [/tex]

1. how did the prototype help you think about your idea?

it can clarifies the things about the products as well as the user flow.

2. what was frustrating about making a prototype?

There may be too much variation in requirements.

hope it helps

[tex] \: \: \: \: \: \: [/tex]

Write a program to input 6 numbers. After each number is input, print the biggest of the numbers entered so far.

Answers

Answer:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

# num 2 #

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

# num 3 #

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

# num 4 #

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

# num 5 #

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

# num 6 #

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

Explanation:

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python  as:

num1 = int(input("Enter a number: " ))

print("Largest: " + str(num1))

num2 = int(input("Enter a number: "))

if num2 > num1:

print("Largest: " + str(num2))

else:

print("Largest: " + str(num1))

num3 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3)))

num4 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4)))

num5 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5)))

num6 = int(input("Enter a number: "))

print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))  

See more about python at brainly.com/question/13437928

Other Questions
When a person's heart muscle doesn't get enough blood, he or she may have chest pain or discomfort, called __________, which is the most common symptom of coronary artery disease. Please helpI will award brainliest! Anitha types 200 words in half an hour How many words will she type in 12 minutes , if typing speed remains the same 5.The amount of pollution produced by cars was measured for cars using gasoline containing different amounts of lead. what is the independent, dependent and controlled variables? Khaled is preparing to paint his room. If it would take three workers 8 hours to apply two coats ofpaint, how long would it take four workers to apply one coat of paint? Solve for x 5(x+8)=2x7+8(x1) please answer the question fast with step by step explanation What physical feature can be found at 1755' S latitude, and 25 51' E longitude?A. Mt. KilimanjaroB. Victoria FallsC. Mt. KenyaD. Lake TurkanaLotugip Swamp Explain the difference between (3) -n and (3) n Which is the correct use of thefollowing participle phrase:dancing at the party last nightA. Dancing at the party last night, the car rolledaway.B. Dancing at the party last night, I did not seethe car roll away.C. Dancing at the party last night, the car haddisappeared A sample of carbon dioxide gas has a pressure of 8.33 bar and a volume of 10.3 mL at a temperature of 29.1 C. How manymolecules of carbon dioxide gas are in the sample?molecules: Find the slope and the yintercept of the line in the graph.The slope is .The yintercept is .Can anyone help me? Predict the missing component of each reaction. ? 2 upper N a upper B r right arrow 2 upper N a upper C l plus upper B r subscript 2. HCl Cl2 Na HBr right arrow upper M g upper O plus upper H subscript 2. ? CHO C2H2 CO2 CO2 2H2O C 2H2O. En el siguiente circuito se conectan tres resistencias, cuyos valores son: 2 , 3 y 5 . Cul es el valor de la resistencia total en el circuito? y A qu tipo de circuito corresponde la imagen? lymph is largely composed of water that has escaped from what is the relationship between area, force, and pressure? which of the following statements if true of high school dropouts Create a maximum of 25 word summary of paragraph 14. How do the effects of the passages differ? The first passage gives information, while the second passage evokes and expresses emotion. The first passage provides details, while the second passage includes a call to action. The first passage gives more information, while the second passage is vague. How many milliliter are in 0.3grams