1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
11

30 POINTS Conduct Interviews

Computers and Technology
1 answer:
Kitty [74]3 years ago
5 0

Answer:

still need help with this if so lmk so o can help ya asap:)9

You might be interested in
From the ages of 18 to 24, individuals born from 1980 to 1984 held an average of 6.2 jobs—which is slightly higher than the numb
Romashka [77]

Answer:

The parameters mentioned show how millennials have a much more marked tendency to job instability, that is, to change jobs more frequently than previous generations.

This is explained by two fundamental factors: on the one hand, the millennial generation differs from previous generations, especially because of their constant need for change and their greater emotional instability, which has a decisive influence on their constant and abrupt changes in their daily routines. , including their jobs; on the other, the deregulation of labor markets worldwide, which, on the one hand, have reduced the percentages of the unemployed population on the planet, but on the other hand, have given employers greater facilities to fire their employees, with which they they must change jobs more quickly.

3 0
3 years ago
U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
Ivan
The answer is "masquerade".
4 0
3 years ago
Create a class Str that subclasses str. Add a method to the subclass that checks if the string does not start with a given strin
Stolb23 [73]

Answer:

#include <iostream>

using namespace std;

class Str{  ///baseclass

   public :

   string super_str;

   string getStr()

   {

       return super_str;

   }

   void setStr(string String)

   {

       super_str=String;

   }

};

class str : public Str{   //inheriting Str publicly

   public :

       string sub_str;

       string getstr()

       {

           return sub_str;

       }

       void setstr(string String)

       {

           sub_str=String;

       }

       bool notstartswith()

       {

           int n=sub_str.length();   //to find length of substr

           bool flag=false;

           for(int i=0;i<n;i++)     //Loop to check beginning of Str

           {

               if(super_str[i]!=sub_str[i])

               {

                   flag=true;

                   break;

               }

           }

           return flag;

       }

};

int main()

{

   str s;    //object of subclass

   s.setStr("Helloworld");  

   s.setstr("Hey");

   if(s.notstartswith()==1)     //checking if str is substring of Str

       cout<<"Str does not start with str";

   else

       cout<<"Str starts with str";

   return 0;

}

OUTPUT :

Str does not start with str

Explanation:

Above program is implemented the way as mentioned. for loop is being used to check the beginning of the str starts with substring or not.

3 0
3 years ago
Font changes can only be applied on a word-by-word basis.<br><br><br> A.True<br><br><br> B.False
Sergio039 [100]
B. False, it doesnt only have to be applied word by word


3 0
3 years ago
Read 2 more answers
Briefly explain the cooling mechanism implemented in FANLESS Laptops
Akimi4 [234]

The primary function of a fan in a computer system is to cool down the internal components and prevent overheating. Fanless computers use alternative cooling methods and lower-powered components that give off less heat. As a result, these machines are quieter during operation, use less energy and are often more compact than fan-based computers. These advantages are particularly important in business settings.
8 0
3 years ago
Other questions:
  • Assume that name has been declared suitably for storing names (like "amy" , "fritz" and "moustafa") write some code that reads a
    5·1 answer
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
    7·1 answer
  • When should you use the Reply All function when replying to an email
    10·2 answers
  • Which forensics tool would you use to reveal recent pages viewed via the internet explorer browser?
    10·1 answer
  • Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in
    11·1 answer
  • 2 (01.01 LC)
    5·1 answer
  • What is the diffrence between the the grassland and the savanna biomes
    11·2 answers
  • The arguments in a method call are often referred to as ____ . The variables in the method declaration that accept the values fr
    10·1 answer
  • Pls answer will give brainlest dont answer if you dont know Upload your 300-word essay containing the following: the definition
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!