1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bezzdna [24]
3 years ago
11

how to write a function "void funct()" which will accept a string from the user as input and will then display the string backwa

rd.
Computers and Technology
1 answer:
Mariulka [41]3 years ago
5 0

Answer:

#include <bits/stdc++.h>

using namespace std;

void funct(){

   string name;

   cout<<"enter the string: ";

   cin>>name;

   

    reverse(name.begin(), name.end());

    cout<<"The string is : "<<name<<endl;

   

}

int main()

{

   funct();

 

  return 0;

}

Explanation:

create the function funct() with return type void and declare the variable type string and print a message for asking to used enter the string.  

The string enter by user is store in the variable using cin instruction.

after that, we use a inbuilt function reverse() which takes two argument.

firs argument tell the starting point and second index tell the ending point. then, the reverse function reverse the string.

name.begin() it is a function which return the pointer of first character of string.

name.end()  it is a function which return the pointer of last character of the string.

finally, print the reverse string.

for calling the function, we have to create the main function and then call the function.

You might be interested in
What is the Kali Linux's kernel?<br><br> Sorry for english, but help me.
fenix001 [56]

Answer:

I don't knwo if thsi is what you mean, but Kali is a Debian-derived Linux distribution

Explanation:

8 0
3 years ago
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Now the y0utube home screen is gone
erik [133]

Answer:

oh no thanks not good

Explanation:

did you try it on a different device mabye a phone

7 0
3 years ago
Read 2 more answers
You have just purchased a server with Windows Server 2016 Datacenter Edition installed. The server has 4 GB RAM, a 200 GB hard d
Elena L [17]

Answer:

a. Install more RAM

Explanation:

According to my research on information technology, I can say that based on the information provided within the question this server will not work for you purpose unless you install more RAM. This is because Hyper-V server's have a minimum requirement of 4gb, therefore if you want to run 2 servers you can divide all the resources you have since they are enough but not the RAM since you only have the bare minimum for one server. You need to add atleast 4 gb more of RAM.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
3 years ago
The ___________ button represents the start of a hyperlink in Table of contents.
zubka84 [21]

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the <u>whi</u><u>te</u> field to the right of the E button (Recall that the E button represent the entry test).

3 0
3 years ago
Other questions:
  • âwhat two log files are used by older versions of unix and newer version of linux to store log information
    10·2 answers
  • The keyboard and the mouse____ parts of a computer ​
    8·1 answer
  • One of your clients has opened a branch office in another state. Both the main office and the new branch office have fast, relia
    10·1 answer
  • Fill in the blank with the correct response.
    10·1 answer
  • A trackerball is a pointing device
    9·1 answer
  • Help help help help help!!!
    7·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
  • A eclipse occurs at a full moon when the moon passes between earth and the sun
    8·1 answer
  • which type of processor chip is designed to perform a single function and is typically custom-designed?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!