1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
15

Write an expression that concatenates the string variable suffix onto the end of the string variable prefix .

Computers and Technology
2 answers:
Hitman42 [59]3 years ago
6 0
Prefix + suffix

Many languages overload the addition operator so that if it gets string arguments, it concatenates the strings.
motikmotik3 years ago
6 0

the answer to your problem is: prefix + suffix

You might be interested in
QoS services are protocols that allow routers to make decisions about which IP datagram may be more important than others. Which
Ipatiy [6.2K]

Answer:

A. Service type field

Explanation:

QoS is an acronym for quality of service. It is used for real-time multimedia streaming service or technology such as internet protocol television (iptv), voice over internet protocol (voip), videotelephony, multi-player internet games etc.

QoS services are protocols that allow routers to make decisions about which IP datagram may be more important than others. The IP header field where  QoS details would be found is a service type field. A service type field typically referred to as, type of service (TOS) is an eight (8) bits field which is used to specify details about quality of service (QoS). It basically defines or assigns IP precedence to the individual IP packets on a network.

6 0
3 years ago
Write the HTML to create a hyperlink to the named fragment designated by “top”.
Anna007 [38]

what are you asking for


8 0
3 years ago
Write a program that takes a point (x,y) from theuser and find where does the point lies. The pointcan
agasfer [191]

Answer:

C++ Program .

#include<bits/stdc++.h>

using namespace std;

int main()

{

int x,y;//declaring two variables x and y.

string s;//declaring string s..

cout<<"enter x and y"<<endl;

cin>>x>>y;//taking input of x and y..

if(x>=0 &&y>=0) //condition for 1st quadrant..

cout<<"the point lies in 1st Quadrant"<<endl;

else if(x<=0 &&y>=0)//condition for 2nd quadrant..

cout<<"the point lies in 2nd Quadrant"<<endl;

else if(x>=0 &&y<=0)//condition for 3rd quadrant..

cout<<"the point lies in 3rd Quadrant"<<endl;

else //else it is in  4th quadrant..

cout<<"the point lies in 4th Quadrant"<<endl;

cout<<"enter n to terminate the program"<<endl;

while(cin>>s)//if the user has not entered n the program will not terminate..

{

   if(s=="n")

   {

       cout<<"the program is terminated"<<endl;

       exit(0);

   }

   cout<<"you have not entered n please enter n to terminate the program<<endl;

}

}

Explanation:

The above written program is for telling the point lies in which quadrant.I am first declaring two variables x and y.Then after that taking input of x and y after that checking in which quadrant the point lies.

Taking input of the string s declared earlier for program termination the program will keep running until the user enters n.

4 0
3 years ago
You must signal ___ before any turn or lance change ?
Alexeev081 [22]

Answer:

Your turning signal, or blinker

3 0
3 years ago
Read 2 more answers
Which algorithm is the oldest of the tcp/ip symmetric-key algorithms?
ohaa [14]
Data Encryption Standard, or DES. 
6 0
3 years ago
Other questions:
  • 4. When determining the tone of their tweets, marketers should consider
    8·1 answer
  • What is Gamekit Loa3's all questsions
    14·1 answer
  • Write a recursive function, replace, that accepts a parameter containing a string value and returns another string value, the sa
    5·1 answer
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • The advantage of an electronic ____ is that the content can be easily edited and updated to reflect changing financial condition
    10·1 answer
  • A class of cryptographic algorithms which requires two separate keys, one of which is secret (or private) and one of which is pu
    11·1 answer
  • Jane is creating a slide that will have a large heading and number of bullet points below it. What slide format should she use?
    12·1 answer
  • Why does the randomNumber function only use whole numbers between 0 and 1 (basically, 0 and 1)?
    13·1 answer
  • A new PKI is being built at a company, but the network administrator has concerns about spikes of traffic occurring twice a day
    5·1 answer
  • Which component of the computer keeps the operating system when the computer is running​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!