Microsoft Word is ________________ software.

Question 1 options:

Application


Compiler


System


Programming

Answers

Answer 1

Answer:

Application

Explanation:

Word is used to change things and make things


Related Questions

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

Answers

Complete Question:

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

In other words, your program will keep asking for a new number until the number that the user inputs is within the range of the <firstParameter> and <secondParameter>.

The method should present a message asking for the value within the range as:

Please enter a number within the range of (<firstParameter> and <secondParameter>):

Note that <firstParameter> should be changed by the value received as that parameter and <secondParameter> as well.

If the user inputs a value that it is lower than the first value, the program will show the message:

The input number is lower than <firstParameter>

Note that <firstParameter> should be changed by the value received as that parameter

If the user inputs a value that it is greater than the first value, the program will show the message:

The input number is greater than <secondParameter>

Note that <secondParameter> should be changed by the value received as that parameter.

You do not need to modify anything in the main method, you just need to write the missing parts of your new getIntVal method.

Answer:

#include<iostream>

using namespace std;

void getIntVal(int num1, int num2) {

int num;

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

while(num<num1 || num>num2) {

if(num<num1) {

cout<<"The input number is lower than "<<num1<<endl;

}

if(num>num2) {

cout<<"The input number is greater than "<<num2<<endl;

}

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

}

cout<<"Output: "<<num;

}

int main() {

int num1,num2;

cout<<"Enter lower bound: ";

cin>>num1;

cout<<"Enter upper bound: ";

cin>>num2;

getIntVal(num1, num2);

return 0;

}

Explanation:

Programming Language is not stated, So, I answered using C++

I've added the full source code as an attachment where I use comments to explain difficult lines

Manfred wants to include the equation for the area of a circle in his presentation. Which option should he choose?
O In the Design tab of the ribbon, choose a slide theme that includes the equation.
O In the Home tab of the ribbon, choose Quick Styles and select the equation from the default options.
In the Insert tab of the ribbon, choose Object and select the equation from the dialog box.
In the Insert tab of the ribbon, choose Equation and select the equation from the default options.

Answers

Answer:

In the Insert tab of the ribbon, Manfred should choose Equation and select the equation from the default options.

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

PHP server scripts are surrounded by delimiters, which? *

PHP server scripts are surrounded by delimiters, which? *

Answers

Answer:

The default delimeters are <?php  ...  ?>

Explanation:

They can however be adjusted.  It is common enough to find it written instead as:

<? ... ?>

But from the question your answering, the third option is correct.

Which type of list is most approprite for giving instructions on how to build a bird
house?
Bucket List
Numbered List
Bulleted List
Marked check list

Answers

Use a bulleted list for unordered items; use a numbered list for ordered items.

What is bulleted list?A bulleted list is an unordered list of items where every item has a graphical bullet. The bullets may be characters of different fonts, as well as graphical icons.Bulleted lists help the author structure the text in a better way - provide a list of application components, list of usage scenarios, etc. When the order of elements is not important and you don't need to refer to a list element later in the text, it's good to use bulleted lists. They help avoid the perception of the elements order importance.When the order of elements is important (instruction steps, list of itemns ordered by importance), you can use a numbered list instead.

To learn more about bulleted list refer to:

https://brainly.com/question/26707368

#SPJ1

ed 4. As a network administrator of Wheeling Communications, you must ensure that the switches used in the organization are secured and there is trusted access to the entire network. To maintain this security standard, you have decided to disable all the unused physical and virtual ports on your Huawei switches. Which one of the following commands will you use to bring your plan to action? a. shutdown b. switchport port-security c. port-security d. disable

Answers

To disable unused physical and virtual ports on Huawei switches, the command you would use is " shutdown"

How doe this work?

The "shutdown" command is used to administratively disable a specific port on a switch.

By issuing this command on the unused ports, you effectively disable those ports, preventing any network traffic from passing through them.

This helps enhance security by closing off access to unused ports, reducing the potential attack surface and unauthorized access to the network.

Therefore, the correct command in this scenario would be "shutdown."

Learn more about virtual ports:
https://brainly.com/question/29848607
#SPJ1

A Meera array is defined to be an array containing only numbers as its elements and for all n values in the array, the value n*2 is not in the array. So [3, 5, -2] is a Meera array because 3*2, 5*2 or 2*2 are not in the array. But [8, 3, 4] is not a Meera array because 2*4=8 and both 4 and 8 are elements found in the array. Write a function that takes an array of numbered elements and prints “I am a Meera array” in the console if its array does NOT contain n and also n*2 as value. Otherwise, the function prints “I am NOT a Meera array” ○ Test 1: checkMeera([10, 4, 0, 5]) outputs “I am NOT a Meera array” because 5 * 2 is 10 ○ Test 2: checkMeera([7, 4, 9]) outputs “I am a Meera array” ○ Test 1: checkMeera([1, -6, 4, -3]) outputs “I am NOT a Meera array” because -3 *2 is -6

Answers

The program based on the question requirements:

The Program

function checkMeera(arr) {

 for (let num of arr) {

   if (arr.includes(num*2)) {

     console.log("I am NOT a Meera array");

     return;

   }

 }

 console.log("I am a Meera array");

}

The function takes an array as input and iterates through each element using a for-of loop.

For each element, it checks if its double is also present in the array using the includes() method.

If found, the function prints "I am NOT a Meera array" and returns. If no such element is found, the function prints "I am a Meera array".

Read more about programs here:

https://brainly.com/question/23275071

#SPJ1

Jose is a kind co-worker who listens to suggestions and always follows through with help when he has offered it. Jose has which type of power?


coercive power


expert power


connection power


referent power

Answers

Jose exhibits referent power.The correct answer is option d.

Referent power is based on the personal qualities and characteristics of an individual that make them likeable and respected by others. It stems from the ability to build positive relationships, gain trust, and inspire loyalty.

In this case, Jose's kind and attentive nature, along with his willingness to listen to suggestions and provide help when needed, demonstrates his referent power. His co-workers view him as a trusted and respected individual, and they value his opinions and support.

They are likely to seek his advice and follow his lead because they genuinely admire and trust him.

Referent power is effective in influencing others because it is rooted in interpersonal relationships rather than formal authority or expertise. It is a result of the positive feelings and connections individuals have with someone they respect and admire.

By leveraging his referent power, Jose can foster a supportive and collaborative work environment, where people feel valued and motivated to contribute their best.

Overall, Jose's referent power stems from his likability, trustworthiness, and ability to establish meaningful connections with his co-workers.

For more such questions power,Click on

https://brainly.com/question/29569820

#SPJ8

Which financial aid program may require you to serve in the military after
earning a degree?
Scholarships and grants
Work-study
Reserve Officer Training Corps (ROTC)
Subsidized loans

Answers

Answer:

Reserve Officer Training Corps (ROTC)

Explanation:

If you can answer theses ill give u a brainliest (i think thats how u spell it) but only if u get it right u will get one NOT A SCAM!!

Question: In which logical operator at least one condition has to be true?

O or

O None of the above

O not

O and

Question: In which logical operator both conditions must be true?

O and

O or

O not

O None of the above

Answers

Answer:

or / and

Explanation:

i took the quiz at unitek college

Answer:

1. or

2. and

Explanation:

when analyzing threats, which of the following would be classified a low threat? A. A flood in a Florida data center B. A terrorist attack on a buildinh in california c. Hurricane damage to an electrical generatinh facility in lowa D. RA social engineering attack on a centers for Disease Control and Prevention​

Answers

When analyzing threats, the following occurrence would be classified as a low threat: C. hurricane damage to an electrical generating facility in lowa.

What is a low threat?

A low threat can be defined as a type of threat that is not likely to cause failure, harm, or severe injury, especially because it is characterized by minimal (low) risk.

In this context, we can infer and logically deduce that hurricane damage to an electrical generating facility in lowa would be classified as a low threat when analyzing threats.

Read more on low threat here: https://brainly.com/question/8066984

#SPJ1

ov. 1 Dollar Store purchases merchandise for $1,400 on terms of 2/5, n/30, FOB shipping point, invoice dated November 1. 5 Dollar Store pays cash for the November 1 purchase. 7 Dollar Store discovers and returns $150 of defective merchandise purchased on November 1, and paid for on November 5, for a cash refund. 10 Dollar Store pays $70 cash for transportation costs for the November 1 purchase. 13 Dollar Store sells merchandise for $1,512 with terms n/30. The cost of the merchandise is $756. 16 Merchandise is returned to the Dollar Store from the November 13 transaction. The returned items are priced at $260 and cost $130; the items were not damaged and were returned to inventory. Journalize the above merchandising transactions for the Dollar Store assuming it uses a perpetual inventory system and the gross method.

Answers

On November 1, Dollar Store purchased $1,400 of merchandise with terms 2/5, n/30, FOB shipping point. On November 7, $150 of defective merchandise was returned for a cash refund. On November 10, Dollar Store paid $70 for transportation costs. On November 13, Dollar Store sold merchandise for $1,512 with terms n/30, and on November 16, returned $260 of merchandise that was not damaged and returned to inventory. Journal entries are required.

As per the given scenario, on November 1, Dollar Store purchased merchandise worth $1,400 on terms of 2/5, n/30, FOB shipping point.

On November 5, the store paid cash for the purchase.

On November 7, defective merchandise worth $150 was returned for a cash refund.

On November 10, the store paid $70 cash for transportation costs related to the November 1 purchase.

On November 13, Dollar Store sold merchandise worth $1,512 with terms n/30, and the cost of goods sold was $756.

On November 16, $260 of merchandise was returned to the store, which was not damaged and returned to inventory.

The journal entries for these transactions would be:

Nov. 5: Merchandise Inventory $1,400

Accounts Payable $1,400

Nov. 7: Accounts Payable $150

Merchandise Inventory $150

Nov. 10: Merchandise Inventory $70

Cash $70

Nov. 13: Accounts Receivable $1,512

Sales $1,512

Cost of Goods Sold $756

Merchandise Inventory $756

Nov. 16: Accounts Receivable $260

Sales Returns and Allowances $260

Merchandise Inventory $130

Cost of Goods Sold $130

In summary, these transactions involve purchases, sales, returns, and allowances, and are recorded in the respective accounts in the perpetual inventory system using the gross method.

For more such questions on Merchandise:

https://brainly.com/question/27773395

#SPJ11

what is a client server network and its features?​

Answers

Answer:

A client-server network is the medium through which clients access resources and services from a central computer, via either a local area network (LAN) or a wide-area network (WAN), such as the Internet. ... A major advantage of the client-server network is the central management of applications and data.

y library> COMP 107: Web Page Design home > 49. LAB Auto loan (CSS) Students: Section 4.9 is a part of 1 assignment Week 7 LAB: Auto Loan (CSS) 4.9 LAB: Auto loan (CSS) Create an external stylesheet so the provided HTML produces the following web page Comparison of Dealer Incentives and Loan Offers Purchase Offer 1 Purchase Offer 2 am Cost Purchase price $33.500 Purchase price Cash incentive rebate $0 Cash incentivebate Loan term (months) 48 Loan term (mores Annual percentage rate (APR) 32 Annual porcentago (APS) Monthly payment 572530 Monthly payment search D O 方 E

Answers

This lab requires that you create an external stylesheet to style the web page. You should include elements such as font size, font family, font weight, font style, font color, background color, background image.

What is the elements?

Elements are the basic substances that make up all matter in the universe. They are the fundamental building blocks of all matter and are made up of atoms. There are currently 118 known elements, including hydrogen, oxygen, carbon, nitrogen, and iron. Elements are organized on the periodic table according to their chemical and atomic properties. They are classified by their atomic number, number of protons, and chemical properties. When elements combine, they form compounds, which can have properties that are different from the elements that make them up.

To learn more about elements

https://brainly.com/question/29338740

#SPJ1

Apply the Blue, Accent 1 fill color to the selected shape, is the filth option in the first row under Theme Cross, in power point

Answers

The theme cross row under the accent was fill

Type the correct answer in the box. Spell all words correctly.
John wants to use graphical elements on his web page. Which image formats should he use to keep the file size manageable?
John should use
formats to keep the file size manageable.

Answers

Answer:

PNG, GIF

Explanation:

1. You will need to add data to the tables in your design that matches the data in the supplied Excel documents. If your database design doesn't accommodate a given piece of data you must modify your design and implementation to ensure that all data provided in the spreadsheet can be added. a. You may any other data you wish and as your design requires. If your design is such that the needed data is not supplied in the spreadsheet you will need to simply "mock" up some sample data and add it into your database. b. Important: Your instructor cannot provide you with specific information how to complete this step. Each person's database design will be different and therefore, how data must be entered will be different from person to person.

Answers

Answer:

is all about knowing what to do with the data

Explanation:

determine what to do with your data

What does the following binary code translate to? Tip: Use an ASCII "character to binary" chart to help you find an answer. 01101000 01100101 01101100 01101100 011011

Answers

Answer:

Explanation:

The following binary code translates to the word "hello" in ASCII characters.

Using an ASCII "character to binary" chart, we can find that:

01101000 corresponds to the letter "h"

01100101 corresponds to the letter "e"

01101100 corresponds to the letter "l"

01101100 corresponds to the letter "l"

01101111 corresponds to the letter "o"

So the entire binary code 01101000 01100101 01101100 01101100 01101111 translates to the word "hello".

The following binary code translates to the word "hello" in ASCII characters.

Using an ASCII "character to binary" chart, we can find that:

01101000 corresponds to the letter "h"

01100101 corresponds to the letter "e"

01101100 corresponds to the letter "l"

01101100 corresponds to the letter "l"

01101111 corresponds to the letter "o"

So the entire binary code 01101000 01100101 01101100 01101100 01101111 translates to the word "hello".

What is binary code?

The only mainly two states in binary code are off and on, which are often represented by the numbers 0 and 1 in digital computers. Binary code is based on the a binary number system.

Some key features of binary code are-

Electrical pulses that indicate numbers, words, and processes to be carried out make up a binary code signal.

Regular pulses are transmitted by a clock, and transistor switch on (1) and off (0) to pass and block the pulses.

Every decimal number (0–9) are represented in binary code by a group of 4 binary digits, called bits.

A binary number would be a positional number having the base value of two. Two separate numbers, zero and one, make up the binary number system.

A binary number system contains two distinct numbers, zero and one. For all other numbers, these could be used as a substitute. It is widely utilized in electronics and computer-based devices, networking, and digital signal processing because to the benefits of straightforward implementation using logic gates.

To know more about binary code, here

brainly.com/question/9480337

#SPJ2

Which three actions can be done to panels to customize a user's Photoshop space?
Report them
Show them
Cast them
Separate them
Nest them

Answers

Answer:

Show them

Separate them

Nest them

Explanation:

In Photoshop space, the three actions that can be done to panels to customize a user's space is to show them, make them visible then nest them, and separate them.

what is the purpose of a company's data strategy​

Answers

Explanation:

A data strategy helps by ensuring that data is managed and used like an asset. It provides a common set of goals and objectives across projects to ensure data is used both effectively and efficiently..

The purpose that data strategy of a company serve is for effective management of data and make sure the clients are data-driven with transformative data culture.

Data strategy is needed by a company for effective data management, it helps the company to make use the data at hand effectively and efficiently to achieve their goals.

This motivate the client to be data-driven by utilization of through modern data as well as  cloud platforms.

Therefore, Data strategy is very important.

Learn more at

https://brainly.com/question/13445261?referrer=searchResults

Describe why some people prefer an AMD processor over an Intel processor and vice versa.

Answers

Answer: AMD’s Ryzen 3000 series of desktop CPUs are very competitive against Intel’s desktop line up offering more cores (16 core/32 thread for AMD and 8 core/16 thread for Intel) but with a lower power draw - Intel may have a lower TDP on paper but my 12 core/24 thread 3900x tops out at around 140W while a i9 9900K can easily hit 160W-180W at stock settings despite having a 10W lower TDP.

Identify and explain the determining factors to look out for when picking out if a CPU
and motherboard are compatible and match each other.

Answers

The socket type, chipset, and BIOS version are deciding elements to take into account when choosing a CPU and motherboard to make sure they are physically compatible and offer the capabilities you need.

What aspects must to be taken into account while selecting a CPU?

The number of cores required, the intended usage of the computer, the type of software to be used, processor compatibility, and CPU performance are the primary factors to take into account when purchasing a CPU.

What happens if the CPU and motherboard are incompatible?

The motherboard won't function if you purchase one that is incompatible with your processor. Both the motherboard and the CPU are built to work together. Purchasing these two hardware items simultaneously

To know more about motherboard  visit:-

https://brainly.com/question/29834097

#SPJ1

What situations might call for nontraditional presentation distribution methods? Check all that apply. web-based training VOIP (Voice over IP) meetings e-books on-the-job training distance education O e-learning informal learning​

Answers

Answer:

I. Web-based training

II. VOIP (Voice over IP) meetings

III. Distance education

IV. e-learning

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

A nontraditional presentation distribution method typically involves the use of digital based platforms for the presenting informations to the audience.

Hence, the situations that might call for nontraditional presentation distribution methods include;

I. Web-based training

II. VOIP (Voice over IP) meetings

III. Distance education

IV. e-learning

Answer:

(A)

(B)

(E)

(F)

Explanation:

web-based training

VOIP (Voice over IP) meetings

distance education

e-learning

To better align with Agile and DevOps principles, what type of system should be
used for code management?
O commercial systems
O source control systems
Oopen source systems
O cloud systems
O I don't know this yet.

Answers

The type of system that should be used for code management is cloud systems.

How does DevOps align with Agile?

DevOps is known to be a method that is often used to software development that helps teams to create, test, and also be able to release software in a quick way and also in a more reliably way by incorporating agile principles and also their practices, e.g increased automation and better collaboration between development and that of operations teams.

Note that Agile and DevOps often uses Virtualization technology and this is one that can be used to run all areas of the enterprise IT environment.

Hence, The type of system that should be used for code management is cloud systems.

Learn more about DevOps principles from

https://brainly.com/question/24499667

#SPJ1

My program below produce desire output. How can I get same result using my code but this time using Methods. please explain steps with comments. Ex.

public class Main {
static void myMethod() {
// code to be executed
}
}

My program below produce desire output. How can I get same result using my code but this time using Methods.

Answers

To achieve the desired output using methods, one need to modify your code.

java

public class Main {

   public static void main(String[] args) {

       double[] subtotalValues = {34.56, 34.00, 4.50};

       double total = calculateTotal(subtotalValues);

       System.out.println("Total: $" + total);

   }

   public static double calculateTotal(double[] values) {

       double sum = 0;

       for (double value : values) {

           sum += value;

       }

       return sum;

   }

}

What is the program?

A computer program could be a grouping or set of informational in a programming dialect for a computer to execute.

Computer programs are one component of program, which moreover incorporates documentation and other intangible components. A computer program in its human-readable shape is called source code.

Learn more about program  from

https://brainly.com/question/30783869

#SPJ1

Not all programming languages are appropriate for all users.

Answers

Answer:

Maybe. But you can learn....

Explanation:

Could you mark this answer as brainiest?

Thanks!

dos medios electrónicos utilizados para hacer
publicaciones de forma personal donde se aborden temas específicos y se puedan compartir conocimientos y opiniones de forma regular.

Answers

Answer:

blogs y redes sociales.

Los blogs son diarios en línea que se actualizan regularmente con publicaciones, que pueden variar desde artículos de opinión hasta tutoriales detallados. Las redes sociales permiten a los usuarios publicar actualizaciones rápidas, fotos y videos, e interactuar con otros usuarios. Ambas plataformas son excelentes formas de hacer publicaciones de manera personal y compartir conocimientos y opiniones con los demás.

Explanation:

Create a class named Apartment that holds an apartment number, number of bedrooms, number of baths, and rent amount. Create a constructor that accepts values for each data field. Also create a get method for each field. Write an application that creates at least five Apartment objects. Then prompt a user to enter a minimum number of bedrooms required, a minimum number of baths required, and a maximum rent the user is willing to pay. Display data for all the Apartment objects that meet the user’s criteria or No apartments met your criteria if no such apartments are available.

Answers

Solution:

public class Apartment {

int aptNumber;

int bedrooms;

double baths;

double rent;

public Apartment(int num, int bdrms, double bths, double rent) {

aptNumber = num;

bedrooms = bdrms;

this.baths = bths;

this.rent = rent;

}

public int getAptNumber() {

return aptNumber;  

}

public int getBedrooms() {

return bedrooms;  

}  

public double getBaths() {  

return baths;  

}  

public double getRent() {  

return rent;  

}  

}  

import java.util.*;  

public class TestApartments {

public static void main(String args[]) {  

Scanner input = new Scanner(System.in);  

Apartment apts[] = new Apartment[5];

apts[0] = new Apartment(101, 2, 1, 725);

apts[1] = new Apartment(102, 2, 1.5, 775);

apts[2] = new Apartment(103, 3, 2, 870);

apts[3] = new Apartment(104, 3, 2.5, 960);  

apts[4] = new Apartment(105, 3, 3, 1100);  

int bdrms;

int baths;

double rent;

int count = 0;  

System.out.print("Enter minimum number of bedrooms needed >> ");

bdrms = input.nextInt();

System.out.print("Enter minimum number of bathrooms needed >> ");

baths = input.nextInt();  

System.out.print("Enter maximum rent willing to pay >> ");  

rent = input.nextDouble();  

System.out.println("\nApartments meeting citeria of\nat least " + bdrms + " bedrooms, at least " + baths + " baths, and " + " no more than $" + rent + " rent:");

// Write your code here

boolean isExist = false;

for(int i=0; i<apts.length; i++){

if(checkApt(apts[i], bdrms, baths, rent)){  

display(apts[i]);

isExist = true;  

}  

}  

if(!isExist){  

System.out.println("No apartments met your criteria");

}  

}  

public static boolean checkApt(Apartment apt, int bdrms, double baths, double rent) {

// Write your code here  

if(apt.getBedrooms()>=bdrms && apt.getBaths()>=baths && apt.rent<=rent)  

return true;  

return false;

}  

public static void display(Apartment apt) {

System.out.println(" Apt #" + apt.getAptNumber() + " " + apt.getBedrooms() +" bedrooms, and " + apt.getBaths() + " baths. Rent $" + apt.getRent());  

}  

}  

Suppose that you have created a program with only the following variables
Int age=34
Int weight =180
Double height =5.9
Suppose that you also have a method with the following header:
Public static void calculate (Int age, double size)

Which of the following methods calls are legal and why
Calculate (age, height)
Calculate (weight, weight)

Answers

Explanation:

Calculate (age, height) is legal because method's second argument (double size), needs double value.

C++ code

Your task is to write a program that parses the log of visits to a website to extract some information about the visitors. Your program should read from a file called WebLog.txt which will consist of an unknown number of lines. Each line consists of the following pieces of data separated by tabs:

IPAddress Username Date Time Minutes

Where Date is in the format d-Mon-yy (day, Month as three letters, then year as two digits) and Time is listed in 24-hour time.

Read in the entire file and print out each record from April (do not print records from other months) in the format:

username m/d/yy hour:minuteAM/PM duration

Where m/d/yy is a date in the format month number, day number, year and the time is listed in 12-hour time (with AM/PM).

For example, the record:

82.85.127.184 dgounin4 19-Apr-18 13:26:16 13

Should be printed as something like:

dgounin4 4/19/18 1:26PM 13

At the top of the output, you should label the columns and the columns of data on each row should be lined up nicely. Your final output should look something like:

Name Date Time Minutes
chardwick0 4/9/18 5:54PM 1
dgounin4 4/19/18 1:26PM 13
cbridgewaterb 4/2/18 2:24AM 5
...(rest of April records)
Make sure that you read the right input file name. Capitalization counts!

Do not use a hard-coded path to a particular directory, like "C:\Stuff\WebLog.txt". Your code must open a file that is just called "WebLog.txt".

Do not submit the test file; I will use my own.

Here is a sample data file you can use during development. Note that this file has 100 lines, but when I test your program, I will not use this exact file. You cannot count on there always being exactly 100 records.

Hints
Make sure you can open the file and read something before trying to solve the whole problem. Get your copy of WebLog.txt stored in the folder with your code, then try to open it, read in the first string (195.32.239.235), and just print it out. Until you get that working, you shouldn't be worried about anything else.

Work your way to a final program. Maybe start by just handling one line. Get that working before you try to add a loop. And initially don't worry about chopping up what you read so you can print the final data, just read and print. Worry about adding code to chop up the strings you read one part at a time.

Remember, my test file will have a different number of lines.

You can read in something like 13:26:16 all as one big string, or as an int, a char (:), an int, a char (:), and another int.

If you need to turn a string into an int or a double, you can use this method:

string foo = "123";
int x = stoi(foo); //convert string to int

string bar = "123.5";
double y = stod(bar); //convert string to double
If you need to turn an int or double into a string use to_string()

int x = 100;
string s = to_string(x); //s now is "100"

Answers

A good example C++ code that parses the log file and extracts by the use of required information  is given below

What is the C++ code?

C++ is a widely regarded programming language for developing extensive applications due to its status as an object-oriented language. C++ builds upon and extends the capabilities of the C language.

Java is a programming language that has similarities with C++, so for the code given,  Put WebLog.txt in the same directory as your C++ code file. The program reads the log file, checks if the record is from April, and prints the output. The Code assumes proper format & valid data in log file (WebLog.txt), no empty lines or whitespace.

Learn more about  C++ code  from

https://brainly.com/question/28959658

#SPJ1

C++ code Your task is to write a program that parses the log of visits to a website to extract some information
C++ code Your task is to write a program that parses the log of visits to a website to extract some information
Other Questions
Write the squares function which:a) to accept an unspecified number of parameters (we assume integer values), andb) be a generator functionsquares should sequentially return (according to a generator function) the square of the difference of each value from the average of all values given to it as input.In the main program call squares (in any correct way you like) to display the results it returns when given the triplet of values 3,4,5 as input parameters (see examples below). Also use the statistics library to calculate the average.Execution example: If the triplet of values 3, 4, 5 are given as input parameters then squares will return 1, 0 and 1 consecutively because the average of 3, 4, 5 is 4 and the squares of the difference of each value from the average are 1, 0 and 1 respectively.Another example: If given as input parameters the square of values 2, 7, 3, 12 then squares will successively return 16, 1, 9, and 36 because the mean is 6 and the squares of the difference of each value from the mean is 16, 1, 9, and 36 respectively.WHAT TO WATCH OUT FORWe assume that squares is always given integer values (at least one or more) as input, so you don't need to check for this.The exercise clearly does not ask that the code be executed multiple times in an iteration loop. Any use of a repeat loop that completely repeats the execution of the program will be considered an error. the name, mongodb, comes from the word humongous as its developers intended their new product to support extremely large data sets. 20) Laila borrowed $9000 from a bank thatcharges an interest rate of 7.2%compounded annually. How much will shepay back in total on a 4 year loan?LAPU int *nt are in anexponent* Show all work. Type in answer. James correctly proves the similarity of triangles DAC and DBA as shown.HELP PLSSSS ASAP let a and b be the roots of the equation x^2-2(p+1)x+p^2+8=0. If the absolute value of the difference of a and b equals to 2. find p In a patient who was in a motor vehicle crash, which sign most strongly suggests abdominal trauma?A. VomitingB. HypertensionC. TachycardiaD. Diarrhea Find AC!Round to the nearest tenth.B.2391326A Write a balanced half-reaction describing the reduction of aqueous zinc cations to solid zinc. which of the following are components of an effective report heading? check all that apply. it uses creative capitalization it has punctuation correctly applied it is capitalized and emphasized carefully it is grammatically different from other headings it has a clear hierarchy of heading levels the beakers contain aqueous solutions of the weak electrolyte h2so3 (a weak acid). which beaker best represents the compound in solution (water molecules are not shown)? what's a movie or tv show that expresses the theme "its never to late to do the right thing" Describe the downloading process, and how to import transactionsfrom outside of QuickBooks to your company file HELP PLEASE.... YUNG MAAYOS NAMAN I BRAINLIEST KONONCENCE=REPORT Which of the following are managerial skills necessary for being a successful coach he saidTo meopon yourbook will you- (inariect speech Pls answer, will award brainliest Which equation has the same solution as 10x-x+5=4110 x x + 5 = 41? Some of the overall decline in voter turnout at the end of the twentieth century was likely dueto ______.a. increasing citizen involvement in community groupsb. the weakened relationship between interest group leaders and political leadersc. the willingness of citizens to tax themselves to provide important community servicesd. societal changese. the number of interest groups in a community Help with this please can anyone explain how to solve this using %/100 = is/of?