Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Question:
Q1) Write a code that asks the user for a positive integer, computes the square root of that integer, and return the result to the user. The computational error needs to be smaller than 0.01.
1. Get a positive integer 'X' as the input.
2. Start from an initial guess, G.
3. Compute the error = (G^2 - X).
4. If error < 0.01, report the G as the result and stop. If not, go to 5.
5. Update G, G = (G + X/G)/2. Go to 3.
Code Block
//This program computes the square root of a given positive integer and is written by Vahid D on 13/1/13
#include using namespace std; int main() { double G = 10, err; // G is an initial guess and err is the error int X; // input, positive integer cout << "Enter a positive integer: \n"; //ask user to enter a number cin >> X; // get the input err = (G*G - X); // compute the error while ( err > 0.01) // continue updating G till the error is smaller than 0.01 { G = (G + X/G)/2; err = (G*G - X); } cout << "Square root of " << X << " is: " << G << endl; // report the result return 0; }
sir, please give me an source code program for Hierarchial-Directory-system using any Unix/Linux
Benefits of using UML breaks the complex system into discrete pieces that can be understood simply. Handover the system to new team becomes simpler. Complex system can be un
Table, TR and TD Tags Three tags form the essential ingredients for creating a table. TABLE: This is the main tag. It tells the browser that a table follows. It has attrib
Speicified the following piece of code: int i = 1; int j = 4; while (i { if (i%3 == 0) i+=3; else i+=4; if (j%2 == 0) j*=4; els
I need to write a 32 bit adder in MIPS without using the Add command and a divider as well.
Explain Auto increment and Auto decrement mode The register is incremented or decremented after (or before) its value is used to access memory. The address stored in the regi
What is the basic requirement for establishing VLANs?
Define software architecture and describe which types of architectures can be used in Email or Facebook applications
Q. Steps uesd in quine mckluskey method? Step I: Build a table in that every term of expression is represented in row (Expression must be in SOP form). Terms can be expres
Ask question #MinimYour professor wants you to fill a two-dimensional N by N matrix with some numbers by following a specific pattern. According to his explanation as in the figure
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd