give the one simple program using c++programming language​

Answers

Answer 1

Answer:

the ejedjrjr eenekrr

eueeue

Explanation:

u4rururirw


Related Questions

What is the benefit of encapsulation?

A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected

Answers

Answer:

B. To reuse code

Endnotes are indicated by

A. lowercase letters (a, b, c)

B. numbers (1, 2, 3)

C. Roman numerals (i, il, ill)

D. uppercase letters (A, B, C)
They

Answers

Answer:

The answer is D because u have the uppercase letter bold

Answer:

Endnotes are actually indicated by Roman Numerals so option C is correct.

Computer Architecture
1. Define what a "word" is in computer architecture:
A. The size (number of bits) of the address
B. The total number of bits of an instruction (e.g. 16 bits)
C. Word and width are synonymous.
D. A word is the contents of a memory register.
2. What is the difference between a register’s width and a register’s address? (choose all that apply - there may be more than one correct answer)
A. They are both the same!
B. Address is the same for all registers, width is unique for each register.
C. Width is the amount of data a single register holds, address is the location of the register within a larger chip.
D. The address bits of a register is a logarithm of its width.
3. Which of the following is NOT implemented by the Program Counter?
A. Set the counter to 0.
B. Increase the counter by 1.
C. Decrease the counter by 1.
D. Set the counter to any input value.
4. What is the relationship between the size of the address (number of bits) and the word size for memory registers?
A. address bits = 2^(word size)
B. address bits = word size ^ 2
C. address bits = word size
D. address bits = log2(word size)
E. address bits = (word size) / 2

Answers

Answer:

BADDA

Explanation:

BIIING

Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.

What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?

Answers

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).

Answers

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

need help asap
Which statement is true of emerging technologies?

Advancements in communication technologies played a minor part in the rise of globalization.
Developments in communication helped remote locations connect with the world.
Malicious entities can misuse emerging technologies.
There are few disadvantages to the widespread growth of the internet.
The complexity of wireless communication prohibits it from being provided in remote locations

Answers

Answer:

Advancements on communication technologies played a minor part in the rise of globalization.

Explanation:

Answer:

Developments in communication helped remote locations connect with the world.

Explanation:

I took the test, plato/edemetuimedemetuim

References inserted initially as footnotes can be converted to endnotes through an option in the software.

A. True

B. False

Answers

The answer is A. True

The answer is: A) True

Discuss the advantages and disadvantages of artificial intelligence ?
50word

Answers

Answer:

it'll be in points okay.

Explanation:

1. It's a blessing as well as a curse.

2. It changed lives.

3. Helped understand things better.

4. Development.

5. Free knowledge e.g. Brainly

;)

Explanation:

Kxkxkdkeeksldowowowkscoviforkeooododosowkwmdndmdmrnrnrmrmfododoo ododosososxkxkdldldldllwlwwlel ododoeldl ldldldlxl odododo oodoxxoo

Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4

Answers

Answer:

C = 3

Explanation:

The maximum number of physical memory accesses that may be caused by this single instruction is ; 3

This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total

Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores

Answers

Answer:

Explanation:

The following is written in Java. It is a method/function that takes the oldScore as an int input. It turns it into a String, separates all the digits, puts them into an array. Then adds the first digit to the end and removes it from the beginning, thus shifting the entire score one to the left. Then it turns the String variable back into an Integer called finalScore and prints it out.

public static void newScore(int oldScore) {

       ArrayList<Integer> newScore = new ArrayList<>();

       String stringOldScore = String.valueOf(oldScore);

       for (int x = 0; x < stringOldScore.length(); x++) {

           newScore.add(Integer.parseInt(String.valueOf(stringOldScore.charAt(x))));

       }

       newScore.add(newScore.get(0));

       newScore.remove(0);

       String newScoreString = "";

       for (int x:newScore) {

           newScoreString += String.valueOf(x);

       }

       int finalScore = Integer.parseInt(newScoreString);

       System.out.println(finalScore);

   }

What game is this? helpppppp

Answers

Answer:

the sims lol

Explanation:

4.5 Lesson Practice edhesive

Answers

Answer:

Count Variable -- When it hits a limt.

using user input -- its true if the user input is the conditional variable needed to end it.

The two ways that one can end a loop are:

Using user input (Option B)- This is used when its true if the user input is the conditional variable  has to to terminate it;Count Variable (Option D) - When it hits a limit.

What is a loop?

In programming, the sequence of events (instruction) that continues to run repeatedly in the same chain is called a loop.

Thus, it is right to state that the two ways that one can end a loop are:

Using user input (Option B)- This is used when its true if the user input is the conditional variable  has to to terminate it;Count Variable (Option D) - When it hits a limit.

Learn more about loops at:
https://brainly.com/question/24052822
#SPJ9

so i am on a Chromebook with headphones , and I am wondering if you can make it that a tab only play sound on one side of the headphones and other tabs to the other side of the headphones

Answers

No you cannot do that with a single pair of headphones. If you had an dual aux split... you could plug in two pairs of headphones... even if you had two bluetooth pairs I don't think it'd be possible... What do you need to do that for? Maybe I can help find an alternative solution

how do you keep word from trying to capitalize every isolated letter "i"

Answers

Write "i" the write random words then delete it and add the lowercase i
Answer: It’s best to write the letter “i” then on the word suggestions, click “i” and repeat it a few times to let the phone register that you only want your individual “i” to be lowercase.

describe PROM, EPROM and EEPROM memories​

Answers

Answer:

Explanation:

PROM is a Read Only Memory (ROM) that can be modified only once by a user while EPROM is a programmable ROM that can be erased and reused. EEPROM, on the other hand, is a user-modifiable ROM that can be erased and reprogrammed repeatedly through a normal electrical voltage.

Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote

Answers

Answer:

tyafana

Explan

ation:n umbers

No variables and only in one lines

Answers

In python 3.8, we can use a simple print statement.

print(('h0 '*3 +'Merry Christmas\n')*2)

What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control people. It was either on netflix or hulu

Answers

The Innocents on Hulu i think

Answer:Raising Dion?

Explanation:

Was it Raising Dion?

The coding system that has just two characters is called:

a
binary
b
dual.
c
basic.
d
double.

Answers

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

Answer:

a binary

Explanation:

ascii. an agreed method for paring the alpanumeric characther set with binary repersenations used in computers. binary. Pertaining to a number system that has just two unique digits 0 and 1. binary code.

The Mac’s GUI set it apart from earlier operating systems.
True or False

Answers

Answer:

Its true

Explanation:

Just took the test.

Which of the following server types is in the form of a single circuit board?
a. blade
b. tower
O c. rack
O d. dedicated
o

Answers

Answer:

A. Blade

Explanation:

Server Blade means a complete computer system on a single board which includes one or more CPUs, memory, operating system, network connections, and typically includes access to hard drives or other mass storage devices. A Server Blade is designed to be inserted into a space-saving rack, and each rack may contain a number of Server Blades served by one or more power supplies.

If this is multiple choice, a dedicated server can be too.

write aemail to brother for laptop for vitrual classes​

Answers

Answer:

If I were to ask my brother for a laptop, I would go:

Hey, can I have your laptop? I need it for online classes.

Sincerely, [my name]

Dear brother, I really need a lab top for my online classes (explain why you don’t have one) i would really appreciate it :)

Sincerely,
Your bro/ Sis

explain mechanical computer ,electromechanical and electronic computer with example

Answers

Answer:

A mechanical computer uses moving parts to do it’s calculations. Think old style adding machines.Electronic computers use electronic oscillators to generate a clock. The oscillator might include a mechanical element such as a crystal, but the majority of the clock signal is processed in the electrical domain.

Explanation:

An example of a mechanical computer clock is a Swiss watch movement, which needs no electronics. Movement is based upon springs coupled to other mechanical pieces. Swiss watches are high precision mechanical computers that do counting. There are other types of more sophisticated mechanical computers. Research the works of Konrad Zuse and his Z1 mechanical computer.

Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?​

Answers

Answer:

Hence f(z)=11

*This is what i think*

Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs will be most helpful?

A. counter module

B. while loop

C. for loop

D. mean module

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is A: counter module.

Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.

Other options are not correct because:

While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.

What causes them to catch your attention in advertisements?

Answers

Answer:

advertisement should be nice and attractive to get attention of people

We can create tables in MS. Word from *
2 points
Insert Tab
Home Tab
Mailings Tab

Answers

Answer:

insert tab

Explanation:

hope it helps

Answer:

we can create tables in ms word from Insert table

Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B

Answers

Answer:

The answer is D. A and B

Explanation:

I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.

Answer: The answer is D. A and B

Explanation: I took this test 5 mins ago and it was right.

A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?

Answers

Answer:

3 Volts.

Explanation:

Answer:

3 Volts

Explanation:

Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :

2.4 W = Voltage x 0.8 A

Then if you rearrange the equation, it would be :

2.4 W / 0.8 A = Voltage

Which is :

3 V = Voltage

A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.

Answers

Answer:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Explanation:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming
Other Questions
What changes do you see to come now that Joe Bien is our president? Plz answer ! Your Position on wearing masks? ( This is an actual question from my teach ) If 1 and 2/3 cups of something fills 3/4 of a container, how many cups fill the container Is it a bhad idea to get high at school?How can I not act sus while high? Which of the following is the best choice to demonstrate the levels of orgaization in plants? PLEASE HURRY ILL REWARD YOU!!!!!A. leaf-> tree-> xylem-> plant cell-> shoot systemB. tree->leaf ->plant cell ->xylem -> shoot systemC. plant cell-> xylem -> leaf-> shoot system -> treeD. shoot system->xylem -> leaf-> plant cell-> tree Why were people afraid of the KKK? Which property is illustrated? x + y = y + x Which of the following is not true about the play Hedda Gabler The photo shows a portion of an airport. The measure of Z4 is 84. Find the measureof Z3.Help { consonants in the word MATHS} Write the electron configuration for Br, with 35 protons and 35 electrons. Please help 30 points plus brainlyist who does firstDetermine which expressions can be simplified further, and which cannot. Sort the expressions into the correctcategory2x + 3yCan Be SimplifiedCannot Be Simplifiedx + x4r +7y + 14y + 4xy + 2y A mixture of the gases neon and krypton is in a 2.00 L container with a pressure of 1.60 atm. The partial pressure of the neon is 0.40 atm. What is the partial pressure of the krypton? (HELP ME PLEASE ILL GIVE BRAINLIEST) A medical imaging scan that includes a patient's right lung, heart, and left lung is examined. The scan doesn't indicate in which plane it was taken. Based on the contents of the image, which plane can be ruled out automatically? A. The sagittal plane B. The transverse plane C. The coronal plane D. The anatomical plane Complete the proof.Given:CM I AB23 = 24Prove:AAMC ABMCC3412MBIch can you help me in this questiona) : the farmer is always at the mercy of trades .who benefits the mostly in the market supply chain .how ? Fill in the blank.Greece is known as the birthplace of Western . Describe the steps in making, packaging, and exporting a protein from a cell. .(02.03 MC) Solve for x: |4x + 12| = 16 (5 points) ??.?.?.?.? Determine the constant rate of change for each table.1. Age (yr) Height (in.)