The value of the expression (int) 27.6 evaluates to:

a. 28
b. 27
c. 26
d. None of the above.


B

Computer Science & Information Technology

You might also like to view...

A secret message has been encrypted with a key that is as long as the message itself. The key will be used for only this message. The type of encryption used here is:

a. Running key cipher b. One-time cipher c. One-time pad d. Diffie-Hellman

Computer Science & Information Technology

The first widely used graphical web browser was developed at:

a. CERN b. NCSA c. NSF d. ARPA

Computer Science & Information Technology

If you misspell a field name in a calculated field of a query and then run the query, Access will:

A) substitute a value of NULL for the field and proceed with the calculation. B) display a dialog box asking for a value for the field. C) substitute a zero value for the field and proceed with the calculation. D) stop running the query and produce no results.

Computer Science & Information Technology

What technology could be used to locate lost pets?

A) Key card B) RFID C) Hardware token D) USS

Computer Science & Information Technology