How many significant digits does a double variable have?

a. 7.
b. 8.
c. 14.
d. 15.


d. 15.

Computer Science & Information Technology

You might also like to view...

What is the purpose of the task list?

What will be an ideal response?

Computer Science & Information Technology

List the dependent tasks and the independent tasks for cooking a meal.

What will be an ideal response?

Computer Science & Information Technology

Ann a security administrator wants a limit access to the wireless network. Which of the following can be used to do this without using certificates?

A. Employ EPA-TLS B. Employ PEAP on all laptops C. Enable MAC filtering D. Disable SSID broadcasting

Computer Science & Information Technology

Which of the following services would Kim, a technician, use to create or update a client's DNS 'A' and 'PTR' records automatically?

A. Kerberos B. BIND C. WINS D. DHCP

Computer Science & Information Technology