I need to learn c++ program . can someone please help me With this​

Answers

Answer 1

Answer:

sure i can help

Explanation:

Answer 2
What’s the work???? Or problem ?

Related Questions

A user with "edit" permissions at the Account level will automatically have "edit" permissions at which other levels?

Answers

Answer:

Property and View.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification. Thus, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Hence, a user with "edit" permissions at the Account level will automatically have "edit" permissions at the Property and View levels.

explain how the internet works​

Answers

How does the Internet Work?

The Internet works through a packet routing network in accordance with the Internet Protocol (IP), the Transport Control Protocol (TCP) and other protocols.

Hope this helps you!

Explanation:

The internet is a worldwide computer network that transmits a variety of data and media across interconnected devices. It works by using a packet routing network that follows Internet Protocol (IP) and Transport Control Protocol (

a user is replacing a motherboard inside of a computer. the user notices that this motherboard has one expansion slot. which type of motherboard will the technician be working on?

Answers

If a user is replacing a motherboard inside of a computer and notices that this motherboard has one expansion slot, then the technician will be working on a microATX motherboard type.

A motherboard is a circuit board that holds all the essential components of a computer, such as the central processing unit (CPU), the random access memory (RAM), the graphics card, the sound card, and other components. The motherboard is the heart of the computer since it allows all of these components to communicate with one another. It can come in various types and sizes, including ATX, microATX, and mini-ITX.MicroATX is a motherboard form factor that is smaller than the standard ATX form factor.

MicroATX motherboards are suitable for computer cases that have limited space but still require expansion slots. They are smaller than full-size ATX motherboards, but they still have most of the same features. MicroATX motherboards are compatible with ATX cases and power supplies, making them a versatile option for computer builds. They can have one or more expansion slots depending on their design.

To know more about microATX motherboard visit:

https://brainly.com/question/32216884

#SPJ11

What is an Array? 20 POINTS!!!
a. the total number of items in the collection

b. how you could order items in the collection (for example, date, price, name, color, and so on)

c. a unique address or location in the collection (for example, page number in an album, shelf on a bookcase, and so on)

d. the type of item being stored in the collection (for example, DC Comics, $1 coins, Pokémon cards, and so on)

Answers

Answer:

I'm about 99% sure it's C: a unique address or location un the collection

At a family reunion, your cousin takes a picture of both of you with her phone, orders a print of it, and mails it to you with a note apologizing for how weird it looks. You would use the word “bitmappy” instead of “weird” to describe the picture. Describe a situation that could have led to this problem. If you wanted to find information online that you could send to your cousin about how to avoid this problem, what are two or three keywords that you could use in your search?
Why is “less is more” such an important design principle, and why do so many people seem to want to violate this rule?

Answers

A bitmap is an image file format that can be used to create and store computer graphics. Weird means something strange or unusual.

What is the meaning of the phrase " less is more"?

Sometimes keeping things simple is preferable to making them complex or advanced. Simplicity is better than extensive adornment. He should not use a word such as 'weird' and  'bitmap' in the search.

The idiom is used to convey the idea that sometimes having less of something—a lesser amount of it—can be preferable to having more of it. That a straightforward strategy frequently outperforms a complex one.

Therefore, A bitmap is an image file format that can be used to create and store computer graphics. Weird means something strange or unusual.

To learn more about, less is more, refer to the link:

https://brainly.com/question/20556896

#SPJ1

Write a code in python that guesses a hardcoded answer and keeps on asking the user until the user gets the answer correct. The cmputer should be telling the user if the number they are guessing is too low or too high.

Answers

import random

#You can change the range.

answer = random.randint(1,1000)

counter = 0

while(True):

   guess = int(input("Make a guess: "))

   message = "Too high!" if guess>answer else "Too low!" if guess<answer else "You won!"

   print(message)

   if(message=="You won!"):

       print("It took",counter,"times.")

       break

   else:

       counter+=1

Write a code in python that guesses a hardcoded answer and keeps on asking the user until the user gets

How can you ensure that your internet search is happening over a secure network connection?.

Answers

A person can you ensure that your internet search is happening over a secure network connection by the use of:

By Renaming your Routers and Networks.The use of a strong passwords.Do Turn on encryption.The use of multiple firewalls.

What is secure network connection?

A secure connection is known to be a kind of a connection that is known to be one that is often encrypted by the use of a single or a lot of security protocols to make sure that the security of data that is known to be passing between two or more nodes.

Therefore, based on the above scenario,  A person can you ensure that your internet search is happening over a secure network connection by the use of:

By Renaming your Routers and Networks.The use of a strong passwords.Do Turn on encryption.The use of multiple firewalls.

Learn more about internet search from

https://brainly.com/question/20850124

#SPJ1

Input/output devices provide data and instructions to the computer and receive results from it.
a. True
b. False

Answers

The computer receives data and instructions from true input/output devices, which also deliver results.

What system is utilised to receive information or commands from the user?

Devices known as input devices provide data to a computer so it can carry out a task. Data and instructions are entered into a computer via input devices such a keyboard, mouse, light pen, etc.

How do input and output devices function in a computer system?

Computer input and output devices: An output device is a device that receives data from a computer system and then reproduces or displays the results of that processing, whereas an input device is a device that delivers data to a computer system for processing.

To know more about input/output visit:-

https://brainly.com/question/30160104

#SPJ1

Plz help
You want Excel to automatically apply “stripes” in an alternating pattern to existing raw data in your spreadsheet. Describe the precise steps you could take to do so. What other function would be added when you apply this change, assuming you have a header row and leave the default options selected?

Answers

Answer:

1)Select the cells you want to shade.

2)On the Home tab of ribbon select Conditional Formatting > New Rule

3)Select 'Use a formula to determine which cells to format' > enter your formula in the 'Edit the Rule Description' field.

4)Click the Format button and from the Format Cells dialog box select the Fill tab > choose your weapon (colour, pattern, fill effect etc.):

Explanation:

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

Who wants to play pool?

Answers

Answer:

I like pool. I'll play!

Explanation:

Help me with this code please.
var steps = 0;

while(steps < 4){

moveForward();

steps++;

}


How many steps can you take before you stop?


1 2 3 4

Answers

After the fourth step, the loop ends and you stop.
what is loop

A loop is a control structure used in programming to repeat a set of instructions until a certain condition is met. It is a very powerful tool that allows a programmer to run a set of code multiple times with different parameters each time. Loops are usually created using a combination of a condition and a counter. The condition is evaluated to determine if the loop should continue to run, and the counter is used to keep track of how many times the loop has run. Once the condition is met, the loop will exit and the program will continue to the next step. Loops help to speed up programming by reducing the amount of code that needs to be written, and they also help to make programs more efficient.

To know more about loop
https://brainly.com/question/9617569
#SPJ1

write a python program to initialize the value of two variables then find sum

Answers

Answer:

JavaScript:

Let x = 10

Let y = 10

Console.log(x + y)

//outputs 20

C++:

Let x = 10

Let y = 10

The file is Math.cpp so,

std::cout << "" + y + "" + x

g++ Math.cpp -o Maths

./Maths

//Outputs 20

Answer:

#Ask the user for a number

a = int(input("Enter a number: "))

#Ask the user for a number

b = int(input("Enter a number: "))

#Calculate the sum of a and b

sum = a + b

#print the ouput

print(str(a) + " + " + str(b) + " = " + str(sum))

using media allows us to:
A. Contribute and create
B. Isolate ourselves from others.
C. Avoid distractions and fun
D. Be completely passive
(I will give brainlist!!!)

Answers

Answer: "Contribute and Create"

Explanation: While, yes, technology and digital media does tend to isolate us from the real world, it is a great tool for contributing to society!

Enumerate the seven (7) old size font system​

Answers

The program can enter NULL for the typeface name, create a list of the available typefaces, and then enumerate each font in each typeface in order to enumerate all the fonts in a device context.

How can I modify Fontlab's EM's size?

You can change the UPM in FontLab by going to File > Font Info > Family Dimensions. The Em is scaled to the required size when type is portrayed on a screen or in print. like in the case of type that is 12 points in size.

What is the largest font size permitted by UPM?

TrueType and OpenType TT fonts often have a UPM size of 16384 font units, while OpenType PS fonts typically have a UPM size of 1000 font units.

To know more about typeface visit :-

https://brainly.com/question/4995232

#SPJ1

For questions 1-3 use context clues to determine the meaning of the bold underlined word.



2. The president of the club is a dilettante who has never been in a leadership position before.

What does dilettante mean?

A. Professional

B. Amateur

C. Expert

D. Composed

Answers

B. Amateur
The president of the club had never been in a leadership position before, which means that he wasn’t an expert and he wasn’t a professional at it. If he was composed, it was mean he was calm.

Enzo’s priority is to build more skateboards and get more customers, but his company has been losing customers due to the amount of time it takes to build a custom skateboard. He needs to focus on time-effectiveness over cost-efficiency for a month to be able to acquire more customers. What should Enzo do? Hire two more employees and spend an additional $3,000 on compensation to produce 1,200 skateboards for the month. Hire one more employee and spend $1,500 on compensation to produce 600 skateboards for the month. Get help from a friend at no cost to produce 500 skateboards for the month. Work day and night to produce 400 skateboards for the month. LIMITED TIME HELP!!

Answers

Answer:

its answer a

Explanation:

i just took the quiz

Hire two more employees and spend an additional $3,000 on compensation to produce 1,200 skateboards for the month.

What is cost-efficiency?

The ability to achieve a desired outcome or output while minimizing the costs or resources required to achieve it is referred to as cost efficiency.

Given that Enzo's primary concern is to build more skateboards and get more customers, and that he needs to prioritize time-effectiveness over cost-efficiency for a month.

The best option for him is to hire two more employees and spend an extra $3,000 on compensation to produce 1,200 skateboards for the month.

This option is the most time and production capacity efficient. Hiring two more employees will increase the workforce and allow Enzo's company to produce more skateboards in a shorter period of time, improving the company's time-effectiveness.

Thus, this can be the answer for the given scenario.

For more details regarding cost-efficiency, visit:

https://brainly.com/question/28240324

#SPJ7

You should enter a formula that subtracts the data in cell B4 from the total of cells B2 and B3. What should the formula look like?

Answers

Use this formula:

=(B2+B3)-B4

How do you calculate the slope for a voltage-current graph?

Answers

Answer:

Choose two points on the line to work from (point C and point D).

Calculate the voltage difference between the two points (the RISE of the slope).

Calculate the current gap between the two points (the RUN of the slope).

Subtract the RISE from the RUN. This is the line's slope.

Explanation:

1) Using the topics below, in 150 words or more for each item, describes how Threat Modeling fits into each:
a) System development life cycle.
b) Software development life cycle (address software development and not system items).
c) Security maturity.
d) Security plan and policies.

Answers

Threat modeling can be described as the method of analyzing a software system or application in order to identify and address any potential security threats and vulnerabilities. This analysis takes into account the components and structure of the system, as well as the external environment in which it will operate. Threat modeling is a crucial aspect of secure software development and can be integrated into various stages of the system development life cycle (SDLC), software development life cycle (SDLC), security maturity, and security plan and policies.

a) System development life cycle: Threat modeling can be integrated into the system development life cycle in several stages, including the design and implementation phase. At this stage, the threat model will help developers identify potential threats and vulnerabilities and ensure that they are addressed early on in the development process. This will help to prevent security issues from being introduced into the system later on and ultimately save time and resources in the long run.

b) Software development life cycle: Threat modeling can be integrated into the software development life cycle by addressing software development and not system items. At the coding stage, developers can use the threat model to help identify potential security vulnerabilities and ensure that they are addressed before the code is deployed. This can help prevent common security issues like SQL injection, cross-site scripting, and other types of attacks.

c) Security maturity: Threat modeling is a critical aspect of security maturity. By using threat modeling, organizations can develop a more comprehensive security strategy that takes into account potential threats and vulnerabilities and addresses them before they can be exploited by attackers. A mature security posture includes a proactive approach to identifying and addressing potential security risks and the use of tools like threat modeling can help organizations achieve this.

d) Security plan and policies: Threat modeling can be used to inform security plans and policies by identifying potential threats and vulnerabilities that need to be addressed. This information can then be used to develop policies and procedures that will help to mitigate these risks and ensure that the system is secure. Threat modeling can also be used to ensure that policies and procedures are effective by identifying potential gaps or areas for improvement. Overall, threat modeling is an essential component of developing effective security plans and policies.

Learn more about System development life cycle here:

https://brainly.com/question/19977141

#SPJ11

Someone help me on this ?

Someone help me on this ?

Answers

Answer:

An expert - Similarity

No special materials - advantage

There maybe a long wait time - disadvantage

Explanation:

Answer:

An expert - Similarity

No special materials - advantage

There maybe a long wait time - disadvantage

Explanation:

Hyperlinks can only point to webpages.

True or False

Answers

Answer:

I believe thats false

help pls
cmu cs 0
4.1.2.1 Creating Groups checkpoint 1

Answers

Answer: For each group, you want to add, click the [ +] sign and select it from the list that shows. A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic between its multiple interfaces.)

Explanation: The Check Point Rule Base must not have these objects. If it does, the Security Management Server will not generate Access Lists. OSE devices report their network interfaces and setup at boot time. Each OSE device has a different command to list its configuration. You must define at least one interface for each device, or the Install Policy will fail.

Which of the following statements is true of learning management systems (LMS)? PICK LETTER
a. An LMS helps companies understand the strengths and weaknesses of their employees, including where talent gaps exist.
b. If a company wants to develop an LMS, it needs to have an online learning environment that is under the control of the instructors.
c. The major reason that companies adopt an LMS is to decentralize the management of learning activities.
d. An LMS increases a company's costs related to training.

Answers

The statement which is true of learning management systems (LMS) based on the provided options is  

a. An LMS helps companies understand the strengths and weaknesses of their employees, including where talent gaps exist.

An LMS helps companies understand the strengths and weaknesses of their employees, including where talent gaps exist. This is true because LMSs allow organizations to track and analyze employee performance, identify areas for improvement, and provide targeted training to address skills gaps.

LMS is a software application used to deliver, manage, and track training and development programs for employees. It allows companies to create and manage training content, track employee progress, and evaluate the effectiveness of training programs.

One of the key benefits of an LMS is that it provides insight into the strengths and weaknesses of employees. By tracking employee progress and performance, companies can identify areas where additional training is needed and can address talent gaps within the organization. This information can be used to create personalized training plans for each employee and to ensure that the company is investing in the right areas to develop and retain its talent.

To learn more about learning management systems (LMS) visit: https://brainly.com/question/16460028

#SPJ11

What is the biggest difference between Blender, Autodesk Maya, and 3DS Max? (1 point)​

Answers

Answer: Maya and Max are the products of AutoDesk, while Blender is a product of the Blender Foundation.

Explanation: The most basic difference between Maya, Max, and Blender is that Maya and Max are the products of AutoDesk, while Blender is a product of the Blender Foundation. Maya was originally a 3D animation and texturing software, and the modeling feature was later added to it.

Luke has been working with a file that has untouched pixel data. Which type of file is it?
RAW
DSL
SLR
JPEG

Answers

Answer:

JPEG

Explanation:

This file ending is the safest file ever.

Hope this helps.

Hi there! I need a bit of help on my computer's assignment. Question is below!


\(\underline{\large\text{Question}}\)

Selena would like go back to a page that she visited recently. She should use the _____.


A) links in the display window


B) scroll bar to scroll up through the pages


C) back button in the navigation bar


D) click on the back button in the display window


\(\underline{\large\text{Exceptions:}}\)


The answer must:


- Be correct.

- Be well explained


The answer must not include:


- Spams

- Incorrect answers

- Incomplete explanation


Good luck :)

Answers

Answer:

The back button of the navigation bar

Explanation:

The back and forward buttons are standard on the many web browsers. The navigation bar is the same place where you type your URLs. In this case, Selena would use the back button to go back to an active window she had previously visited. It helps you move backward in the same order you previously made your visits.

Cisco uses the term the power of in-person to describe the ability of what technology to improve access to subject matter experts and to open doors for small business people?.

Answers

Cisco refers to the capacity of Telepresence technology to provide access to subject matter experts and to open doors for small business owners as the "power of in-person."

CISCO stands for Commercial & Industrial Security Corporation.

The Commercial & Industrial Security Corporation (CISCO), then known as Certis, was established in 1958 as the Police Force's Guard and Escort Unit.

The largest segment of Cisco is "Infrastructure Platforms," which is expected to generate approximately $27.1 billion in sales for the company's fiscal year 2021. Cisco's "Infrastructure Platforms" division includes switching, routing, wireless, and data centre equipment among other networking technology solutions.

Internationally active American technology business Cisco Systems is best recognised for its computer networking solutions.

The size, range, and connectivity requirements of the four types of wireless networks—wireless LAN, wireless MAN, wireless PAN, and wireless WAN—vary.

Learn more about Cisco:

brainly.com/question/27961581

#SPJ4

Telepresence is a technology that Cisco refers to as having "the power of in-person" in order to highlight its capacity to enhance access to subject matter experts and open doors for small company owners.

a technique that makes it possible for someone to behave as though they were genuinely present in a remote or virtual environment. It is based on an open source program that enables you to run a single service locally while coupling it to another Kubernetes cluster. Cisco telepresence devices make it easier to physically collaborate by eliminating distance barriers.

Learn more about Cisco here

brainly.com/question/27961581#

#SPJ4

Julie scrolls through her social media feed and it seems like everyone's life
is so exciting when hers is so ... boring! She starts to feel bad about herself.
What should Julie be paying attention to right now?
A- Oversharing
B- Red flag feeling
C- Miscalculation

Answers

Answer:

b

Explanation:

and julie needs to geta life

write steps for package the presentation to a folder using the PAckage for cd feature. name the folder NEw Products Presentation and save it to the Documents folder. be sure to include link files in the presentation

Answers

To package a presentation using the "Package for CD" feature and save it to the "Documents" folder with the folder name "New Products Presentation," follow these steps:

Open the presentation in the presentation software (e.g., Microsoft PowerPoint).Click on the "File" tab or menu option.Select "Save As" or "Save a Copy."Choose a location to save the packaged folder, such as the "Documents" folder.Enter "New Products Presentation" as the folder name.Select the "Save as type" option, usually found in a drop-down menu, and choose "Package for CD."Click on the "Options" or "Settings" button related to the "Package for CD" feature.Ensure that the "Linked files" or "Link to files" option is selected to include linked files in the packaged folder.Adjust any other settings or options as desired.Click "OK" or "Save" to initiate the packaging process.Wait for the software to complete the packaging process, which may take a few moments.Once the packaging is finished, locate the "New Products Presentation" folder in the "Documents" folder or the chosen save locationBy following these steps, you will have successfully packaged your presentation, including the linked files, into the designated folder named "New Products Presentation" and saved it in the "Documents" folder.

To learn more about  Documents click on the link below:

brainly.com/question/27118000

#SPJ11

Other Questions
Evan is thinking of a number that contains the digit 2. The digit 2 in Evan's number has 10 times the value of the digit 2 in the number 328,907. Which number could be the number that Evan is thinking of? The novel The Alchemist expressed numerous themes. Which of these phrases is NOT one of those themes?A) One must learn to accept one's own personal legendB) Managing chemical imbalances is the key to happiness.C) Perseverance is essential for finding one's purpose in life.D) Learning to have faith is a key part of learning how to live. 0.4567304 x 2.5678093 = ? What is y+3=4(x-1) in Slope intercept form ? Substance D - It has a high melting and boiling point. The arrangement of its particles are closely packed. It cannot conduct electricity unless molten or dissolved in water. What type of element is substance D? Let f(x) = 8x^3-3x^2Then f(x) has a relative minimum atx= __a relative maximum atx=___and infection point atx=___ Tamalas school day is 7 1/2 hours. She has six classes that are 7/6 of an hour long each. How many hours is Tamala not in class while she is at school? If you receive the "Cannot display the folder. Microsoft Outlook cannot access the specified folder location" error, you typically need to rename or delete your .ost file. In Outlook, click File > Account Settings > Data Files to find the location of your OST file. Then close Outlook.Go to the path of OST file, delete or rename the OST file.Restart your Outlook client, a new OST file will be created.Typically this file is in C:\Users\YourName\AppData\Local\Microsoft\OutlookFind your .ost and rename to .bak or .old orally ingested contrast medium opacifies all of the following structures except Which of the following is NOT a way an author creates tone? a) Word Choice b) Descriptions c) Language d) Font size For the nonconventional net cash flow series shown, the external rate of return per year using the MIRR method, with an investment rate of 20% per year and a borrowing rate of 8% per year, is closest One main issue in studying global social inequality is:. Solve the system and give your answer as a coordinate point in the form (k, c) k+c=100 51k+11c=2500 4. Why are the procedures of a floor debate different in the House of Representativesand the Senate? (pp. 8-9) what did the travel routes developed by the mountain men in the upper northwest and oregon territory later become Managers who have the ability to motivate and mold people into a cohesive team are said to possess _______ skills. pls answerWhat claims are made for the product that is advertised? How is itsupposed to improve your life? A water tower is 36 feet tall and casts a shadow 54 feet long, while a child casts a shadow 6 feet long. How tall is the child Complementary products work for firms facing ________ demand fluctuations Express in the form 1:n 8:24