1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
3 years ago
12

Write a main function to do the following: A. Declare an array of 20 strings. B. Create an input file for the file "poem.dat". C

. Read each line of the file into one of the strings in the array. You can assume that there are no more than 20 strings in the file but there may be fewer than 20, so read until end of file. D. Call the function from problem 5 E. for each string you have stored in the array. After each call print the string.
Computers and Technology
1 answer:
elixir [45]3 years ago
6 0

I know you're going to delete my comment but please let it stay.

I have a essay and I need it to be completed and I need to ask a question. If you have a better reason why you need me to explain it, then please reply. IF you can.

Thanks

: )

Read more on Brainly.com - brainly.com/question/15973749#readmore

You might be interested in
Roark has just joined a company and in his role as a lead analyst, he will be responsible for determining which systems developm
hram777 [196]

Answer:

Agile/adaptive methods.

Explanation:

The user has just decided to join a firm and will also be accountable to determine whether that system development technique that group uses to establish the latest software for a significant medical distributor to his position as just a lead analyst.

After that, he consumes a week for the purpose to understand his group members for reason to know their strengths and weakness and how would they work under pressure.

So, the following method is required for him to understand about the disadvantages of each of them.

4 0
3 years ago
Your employer's right to electronically monitor you is an issue of ____.
Cloud [144]

Answer: Employee privacy

Explanation:

 Employers can electronically monitor property, computer and electronic devices under the their rights in the organization but there is issue of employee privacy. As, employee has the right to privacy in the organization or workplace.

In some organization phones and email address are provided by the company so that they can electronically monitor the employee properly. In this case, some employee feel that monitoring is the violation of their personal  and privacy rights.

8 0
3 years ago
What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
marishachu [46]

The subnet mask can be utilized to segment the 172.16.0.0 network to qualify for a minimum of 6 subnets while maximizing the numeral of broadcasters per subnet is 255.255.224.0

<h3>What do subnet masks mean?</h3>
  • A subnet mask is a 32-bit numeral formed by setting keeper bits to all 0s and developing network times to all 1s.
  • In this way, the subnet mask divides the IP speech into the network and host addresses.
  • A subnet mask is used to separate an IP address into two pieces. One element defines the host (computer), and the different part identifies the network to which it belongs.
  • To better comprehend how IP lessons and subnet masks work, look at an IP speech and see how it's managed.

To learn more about  subnet mask, refer to:

brainly.com/question/3234986

#SPJ4

5 0
1 year ago
An automatic door at a store has a sensor in front (A0) and behind (A1). The
yanalaym [24]

Answer:

whats the question?

Explanation:

4 0
3 years ago
Dani is paraphrasing from a paragraph of an article for a post on her blog. Which of the following strategies is least likely to
koban [17]
I would say A. She reads the entire paragraph, then rewrites it in her own words, and then checks to make sure her version is not too similar to the text from the article.


All the other ones are a little too obvious.


Hope this helps you, baii <33

4 0
3 years ago
Read 2 more answers
Other questions:
  • Suggest two other subtasks that may be performed in a dice game?
    15·2 answers
  • What is the differnces between dark and middle ages of computer?​
    9·1 answer
  • Give two reasons why it is important to upgrade your browser when a new version becomes available.
    8·1 answer
  • In Microsoft Windows, which of the following typically happens by default when a file is "double-clicked"
    10·2 answers
  • When possible, you should avoid using _________ variables in a program?
    11·1 answer
  • What is the output of the following program?
    10·1 answer
  • What is modularity? Help asap
    9·1 answer
  • When converting text to a table, which feature should be used?
    12·1 answer
  • 10 sentences about computer parts.
    5·1 answer
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!