1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex17521 [72]
2 years ago
8

Void printInfo()

Computers and Technology
1 answer:
Amiraneli [1.4K]2 years ago
8 0

The output that would be produced by tis code that we have here is going to be  ITP226.

<h3 /><h3>What is the output of a code?</h3>

This is the term that is used to refer to the message that the particular line of code wants to be displayed. It is what gets to be done and displayed when the code has finished running at the end of everything if it is properly written following the rule of syntax for the particular language in question.

This piece of code that has been written here wants the new list 1 to be displayed. What is contained in this list are the values ITP226.

Hence after it has finished running, the solution that would be displayed in the console would be  ITP226.

Read more on code output here: brainly.com/question/5451281

#SPJ1

You might be interested in
Omar’s teacher has asked him to send her a PDF copy of his presentation via email.
Vadim26 [7]

Answer:

1. Export

2. Create PDF/XPS document

3. Standard

4. Click Publish

Explanation:

I got wrong on edg and found the correct answer

8 0
3 years ago
In what type of attack does the attacker send unauthorized commands directly to a database?
Delvig [45]
SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.
4 0
4 years ago
Write the one Sale method of the GroceryStore class. Method oneSale has one parameter: the name of one product (that a customer
DIA [1.3K]

Answer:

Check the explanation

Explanation:

bool oneSale(string item){

for(int i=0;i<capacity;i++){ // iterate till the capcity of array

if(item==grocerryList[i].name()){ // if name matches

 if(grocerryList[i].getStock()>0){ // and stock is greater than 0

  grocerryList[i].setStock(grocerryList[i].getStock()-1); // subtract 1 from the stock

// or alternate is grocerryList[i].stock= grocerryList[i].stock-1;

 return true; // return true

}

}

else if(item==grocerryList[i].name()){ // if name matches

 if(grocerryList.getStock()==0){ // but stock is empty

 return false; // return falsse

}

}

else{ // means item is not available so there is no need to check stock

return false; // return false

}

}

}

8 0
3 years ago
Which technology is used to uniquely identify a wlan network?
expeople1 [14]
The answer is SSID

SSID which in full stands for Service Set Identifier is used to identify a network. It ensures that clients are able to locate a WLAN in which they are attached to. In Layman’s terms, it’s the username or the primary name in a WiFi setup in which a user joins and is connected to.






8 0
3 years ago
_______ technology is used in many hospitals to verify that the correct medication is being dispensed to the applicable patient.
Zepler [3.9K]
Barcode hospital operating suites, cardiac and intensive care units.
8 0
3 years ago
Other questions:
  • What does %d, , %c, %s mean and what's their difference?
    13·2 answers
  • 13) Search engines and metasearch engines are examples of which network application?
    12·1 answer
  • Look at the top 3 banking activities done via mobile banking vs. online banking. What characteristics do you notice for both?
    9·1 answer
  • Write methods to do the following: a. Display three full lines of asterisks on the screen. b. Accept as an argument your name, a
    5·1 answer
  • According to a case study in one of our weekly chapter reading, nearly..................... percent of all employees send work e
    11·2 answers
  • What is a command-line interactive scripting environment that provides the commands for almost any management task in a Windows
    9·1 answer
  • Power point presentation make use of pages known as
    9·2 answers
  • How many characters should a strong password have? four six eight ten
    10·2 answers
  • What is the purpose of a router
    13·2 answers
  • Which kind of image is indispensable and needs added text to go with it?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!