1) The program reads an integer, that must be changed to read a floating point. 2) You will need to move that number into a floating point register and then that number must be copied into an integer register. 3) You will need to extract the exponent from the integer register and stored in another register. 4) You will need to insert the Implied b

Answers

Answer 1
Answer:

Answer:

1. Get the number

2. Declare a variable to store the sum and set it to 0

3. Repeat the next two steps till the number is not 0

4. Get the rightmost digit of the number with help of remainder ‘%’ operator by dividing it with 10 and add it to sum.

5. Divide the number by 10 with help of ‘/’ operator

6. Print or return the sum

# include<iostream>

using namespace std;

/* Function to get sum of digits */

class gfg

{

   public:

   int getSum(float n)

   {

   float sum = 0 ;

   while (n != 0)

   {

    sum = sum + n % 10;

    n = n/10;

   }

return sum;

}

};

//driver code

int main()

{

gfg g;

float n = 687;  

cout<< g.getSum(n);

return 0;

}

Explanation:


Related Questions

CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output for the given program Gus Bob Ann 1 short_names- Your solution goes here 2 # print names 4 print(short_names[0]) 5 print(short names [11) 6 print(short_names[2])
Question textIf operator+ is supported by a class, how many parameters should it be defined to accept?Select one:a. 1 or 2b. 2c. 3d. 1e. None
Which of the following is a central feature of agroup?interactionmutual influenceinterdependenceall of the given options
Shortest Remaining Time First is the best preemptive scheduling algorithm that can be implemented in an Operating System. a. True b. False
Some operating systems have a tree–structured file system but limit the depth of the tree to some small number of levels. What effect does this limit have on users? How does this simplify file system design (if it does)?

What types of messages flow across an SDN controller’s northbound and southbound APIs? Who is the recipient of these messages sent from the controller across the southbound interface, and who sends messages to the controller across the northbound interface?

Answers

The types of messages which flow across an SDN controller northbound and southbound APIs are:

  • Messages that helps to develop flow tables
  • Messages that helps to interact between the controller and network control applications
  • Messages which help for the up-to-date view of the network's state, etc.

The recipient of these messages sent from the controller across the southbound interface, and who sends messages to the controller across the northbound interface are:

  • Controlled devices are the recipient
  • Network control applications send the messages

What is Communication?

This refers to the exchange of information between different people or computers using a medium which also gives feedback.

Read more about communication here:
brainly.com/question/25793182

Answer and Explanation:

Messages flow across an SDN controller's:  

Northbound APIs:  

• Messages which help in read/write state of the network and developing flow tables within the  

state management layer.  

• Notifications for the state-change events.  

• The interaction between the controller and network control applications is done through the  

northbound interface.  

• Network control applications send messages to the controller.  

Southbound APIs:  

• Messages which help for the up-to-date view of the network's state like message for the  

attached link has gone up or down, new devices are joined the network, or indications of the  

device is up or down.  

• Controller's southbound interface is the communication among the controller and the controlled  

devices. Controlled devices are the recipients of the messages sent form the controller.  

Which one of these are a valid IPv4 address? Check all that apply.A. 1.1.1.1
B. 345.0.24.6
C. 54.45.43.54
D. 255.255.255.0

Answers

The valid IPv4 addresses are A. 1.1.1.1, C. 54.45.43.54, and  D. 255.255.255.0

Valid IPv4 addresses are 32 bits in size and normally contain three periods and four octets like 1.1.1.1, and the value can be any number from zero to 255.

IPv4 means Internet Protocol version 4.  It is a set of address that identifies a network interface on a computer.

Thus, the only invalid address according to IPv4 standards is B. 345.0.24.6, with others regarded as valid IPv4 addresses.

Learn more about IPv4 here: brainly.com/question/19512399

Cloud storage refers to the storage of data on ______.a. your mobile device.b. your desktop computer.c. an external drive.d. a server on the Interne.

Answers

The correct answer is:

Cloud storage refers to the storage of data on a server on the internet.

Every organization relies on data, In our daily job, we all make use of a huge amount of data(either in gigabytes or terabytes). And if you have a lot of files on your computer, it's probable that your computer may lose momentum and slow down, resulting in bad performance. While there are several external storage options available for storing and backing up your data, these devices are not infallible. Any incident, such as theft, or damage, might result in the loss of vital data.

This is where Cloud Storage comes into play. Cloud storage is a handy and dependable method of storing and retrieving information on the internet.

It is a cloud computing system in which data is stored on the server-side of the Internet and is managed and operated by a cloud computing provider. 

Therefore, from the above explanation, we can conclude that the correct Option is D

Learn more about Cloud Storage here:

brainly.com/question/23073532?referrer=searchResults

Answer:

D.  server on the internet

Explanation:

Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication. i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks

Answers

Answer and Explanation:

I and II answered

Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.

Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.

Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.

Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.

How many rules are contained in the css code?
a.1
b.2
c.3
d.4​

Answers

I strongly agree that B is the answer

A computer professional who has access to sensitive information shares this information with a third party. Which professional code of conduct did the person violate? A. diligence in service B. company discipline norms C. confidentiality of information D. conflict of interest

Answers

Answer:

Confidentiality of Information

Explanation:

Because when you work for a company that confidential information, the company usually asks it employees not to discuss or share information with anyone. The company usually asks their employees to sign a Confidentiality Contract.