1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laila [671]
2 years ago
14

How do you create a function in C++

Computers and Technology
1 answer:
MArishka [77]2 years ago
7 0

Answer:

1. Declaration: the return type, the name of the function, and parameters (if     any)

2. Definition: the body of the function (code to be executed)

Explanation:

You might be interested in
A cpu handless all the instruction that it recieces from hard ware and software which are available on the computer true or fals
Burka [1]

Answer:

True

Explanation:

The CPU controls the computer like a brain controls a body. And yes it takes instruction from hardware and software and runs it.

4 0
3 years ago
When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
Nastasia [14]

If an EC2 instance is being modified to have more RAM, this is known as Scaling Up.

<h3> What is EC2 Auto Scaling?</h3>

The Amazon EC2 Auto Scaling is known to be a type of fully well handled service that has been set up to launch or hinder Amazon EC2 instances automatically.

It is often made so as to help make sure that people have the correct number of Amazon EC2 instances that is available to manage the load for their  application. To scaleup is to bring up.

Learn more about RAM from

brainly.com/question/13196228

7 0
3 years ago
What are ways to enter a formula in Excel? Check all that apply. Click on the Function Library group and select a function from
zhenek [66]

Answer:

A. Click on the Function Library group and select a function from the drop-down menu.

B. Click on the Function Library group and Insert Function.

E. Type = into any cell.

F. Click on the formula bar above the cells.

3 0
3 years ago
Read 2 more answers
A(n) ____________________ key is a key that is not reused, but rather is only used once, thus improving security by reducing the
taurus [48]

Answer:

Computer Security

Explanation:

if referring to only to a computer, then it can be considered secure when the computer does what is is supposed to do and only what it is supposed to do, but in more modern times the definition has shifted from the computer to the information being processed

3 0
2 years ago
Big films with big budgets typically have a few animators working on them. True False
Georgia [21]

Answer:True

Explanation:

6 0
3 years ago
Other questions:
  • give two main reasons that should be considered when preparing and deploying a functional restoral scenario.
    5·1 answer
  • Please look at picture
    10·2 answers
  • What are personal skills? A manner of individual style How a person manages and expresses oneself One's ability to excel at spor
    13·2 answers
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • On a hard disk each track is divided into invisible wedge-shaped sections called _______
    15·1 answer
  • Write a program that prints the numbers 1 to 4 on the sameline with each pair of adjacent numbers separated by a single space(1
    5·1 answer
  • Enterprise Resource Planning (ERP) is an example of a single user database.
    7·1 answer
  • Which of the following is most likely to be considered plagiarism? Using materials from a source without proper citation. Adding
    5·1 answer
  • Which are the 2 main elements that’s make up computer architecture?
    6·2 answers
  • Why does python code generate fewer types of syntax errors than code in other programming languages?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!