1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
2 years ago
14

How do you create a function in C++

Computers and Technology
1 answer:
MArishka [77]2 years ago
7 0

Answer:

1. Declaration: the return type, the name of the function, and parameters (if     any)

2. Definition: the body of the function (code to be executed)

Explanation:

You might be interested in
Match each word to its correct meaning.
MrMuchimi

Answer:

1. active listening             8. an online journal

2. barrier            1. a strategy for showing other people you are interested in what they are saying and that you understand what they are saying and how they feel about it

3. blog          2. anything that interferes with a message being sent or received

4. communication    5. guidelines for courteous electronic communication

5. netiquette         7. the person who creates or composes a message and delivers it either orally or in writing

6. receiver        9.. a personal belief that one should work hard and do a good job

7. sender             3. an online database of Web pages that can be created or edited by anyone (with permission)

8. wiki            6. the person who receives a message

9. work ethic          4. an exchange of information

Explanation:

The answer is as mentioned above. And these are important words from subject Professional Communication. And like when we talk of an exchange of information, we mean communication. And similarly, other words means as being mentioned above.  

5 0
3 years ago
Does anyone know who this man issss?
devlian [24]

Kaeya Should be the correct answer

3 0
3 years ago
To delete data from a disk in such a way that no one can ever read it, you should ____.
Vlada [557]
Factory reset or install a new OS without keeping the data.
5 0
3 years ago
Why is spyware more dangerous than adware
steposvetlana [31]

To find out how spyware is more dangerous, we must know what each term mean.

Adware is a <em>software that automatically displays advertising material usually on a site that a user goes to</em>.

Spyware is a <em>unwanted software that steals your internet usage data and personal information</em>.

So while Adware can be extremely annoying, it is not as potentially harmful as Spyware, which can steal your personal information and potentially ruin your life.

~

7 0
2 years ago
While writing a program to regulate the speed of a self-driving car, you find that your software sometimes miscalculates the ide
Likurg_2 [28]

Answer:

b. <em>After each calculation within your program, insert a temporary statement that displays the most recently calculated value. When running your program, compare the displayed values with the expected values to identify where in the program the error is being introduced.</em>

Explanation:

Logging statements are an effective debugging technique. It is a good way of finding the location of faulty logic in a program.

One can trace the root problem through logging intermediary outputs.

We can find out from where the program is producing unexpected or unintended calculations, when their's a weird output logged.

3 0
3 years ago
Other questions:
  • Write a function that takes an array of integers and its size as parameters and prints the two largest values in the array. In t
    5·1 answer
  • . Database connectivity software is also known as:
    11·1 answer
  • Charlie wants you to include the following topics in your presntation: an overview of project management and its hrity,a descrip
    15·1 answer
  • The company database may be stored on a central database server and managed by a database adminstrator true or false
    12·1 answer
  • Which table attributes would this code produce?
    15·1 answer
  • Consider a swapping system in which memory consists of the following hole sizes in memory order: 10 MB, 4 MB, 20 MB, 18 MB, 7 MB
    9·1 answer
  • 27. If X and Y are int type variables,
    14·1 answer
  • Why is the yellow light blinking on the front of my computer
    10·1 answer
  • Why is my computer fans making weird noises?
    12·2 answers
  • you need to configure a wireless network using wpa2-enterprise. which of the following components should be part of your design?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!