1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetach [21]
2 years ago
8

Suppose that you have the following definitions:

Computers and Technology
1 answer:
spin [16.1K]2 years ago
6 0

Suppose that you have the following definitions:struct time Type struct tourTypen the variable destination of type your type are tourType input(){cout<<"Enter the city, distance and time in hr and min"<>destination.city name;

<h3>What is C++ statements?</h3>

Expression statements. These statements examine an expression for its aspect outcomes or for its go-back value. Null statements. These statements may be supplied in which a declaration is needed with the aid of using the C++ syntax however in which no motion is to be taken.

  1. #include
  2. #include
  3. the use of namespace std;
  4. struct timeType
  5. ;
  6. struct tourType
  7. ;
  8. tourType destination;
  9. tourType input(){
  10. cout<<"Enter the city, distance and time in hr and min"<>destination.cityName;
  11. cin>>destination.distance;
  12. cin>>destination.travelTime.hr;
  13. cin>>destination.travelTime.min;
  14. go back destination;
  15. }
  16. void display()cityName;
  17. d.distance = t->distance;
  18. d.travelTime.hr = t->travelTime.hr;
  19. d.travelTime.min = t->travelTime.min;">
  20. int main().

Read more about the variable :

brainly.com/question/2804470

#SPJ1

You might be interested in
In Excel, an anchor($) allows you to:
Oksana_A [137]
The answer is the letter B.
6 0
3 years ago
Read 2 more answers
In addition to their full versions, some commercial software is available as a ____ or trial version.
Dimas [21]
Free version also know as the lite version that has less feature and but still allows the user to use the the core functionality
3 0
3 years ago
Which device makes computers that are connected to separate segments appear and behave as if they're on the same segment? (Pleas
Mashcka [7]

Answer: Switch

Explanation:

 The switch is the device that is basically use for the connection for separate segment that basically appear in the similar segment in the computer network.

Switch is the ethernet that is based on the  LAN peruses approaching TCP/IP information packets containing goal data as they go into at least one info ports. The goal data in the bundles is utilized to figure out which yield ports that will be utilized to sending the information on to its proposed goal.

Therefore, Switch is the correct options.

 

4 0
4 years ago
Which process of the enterprise platform interacts with vendors and manages the entire supply chain for a retail client?
Alik [6]

The options are;

A) Data

B) Front Office

C) Core Processing

D) Experience

Answer:

D) Experience

Explanation:

Under enterprise resource planning platform, experience is the process whereby vendors interact and also manage the entire supply chain link on behalf of a retail client.

Thus, option D is the correct answer

4 0
3 years ago
You need to have a password with 5 letters followed by 4 even digits between 0 and 9, inclusive. if the characters and digits ca
aleksandr82 [10.1K]
We all know that there are 26 letters available in the alphabet and there are just 5 even numbers between 0 and 9. We are now given the situation of how many passwords can we make out of the criteria of having 5 letters that cannot be repeated and 4 even digits from 0-9. We cannot repeat the numbers and letters, thus our password will look something like this, LLLLLNNNN, where L is a letter and N is a number. Let us note that  we cannot use the characters and digits more than once.This is how we will solve the probable number of passwords.

26 x 25 x 24 x 23 x 22 x 5 x 4 x 3 x 2

When we compute this formula, we will have the total number of possible passwords:

947,232,000.00

There are 947,232,000 possible passwords based on the given criteria.
8 0
3 years ago
Other questions:
  • Which algorithm is the oldest of the tcp/ip symmetric-key algorithms?
    10·1 answer
  • Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate
    7·1 answer
  • What kind of storage is an internet service that provides storage to computer users?
    12·1 answer
  • Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
    5·1 answer
  • Katherine wants to open a bank account that allowed her to perform frequent transactions without being charged a penalty and she
    14·1 answer
  • What is stored in alpha after the following code executes?
    9·1 answer
  • What are the advantages of using an external style sheet?
    9·1 answer
  • Jenny, a programmer, uses Microsoft Excel 2016 to generate data required for the programs she develops. She uses various functio
    10·1 answer
  • When was third battle of Panipat fought​
    8·1 answer
  • How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!