1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
3 years ago
14

In a program, you need to store the identification numbers of 10 employees (as integers) and their weekly gross pay (as double v

alues). Define two arrays that may be used in parallel to store the 10 employee identification numbers and gross pay amounts Write a loop that uses these arrays to print each of the employees’ identification number and weekly gross pay.
Computers and Technology
1 answer:
dedylja [7]3 years ago
5 0

Answer:

The code to the given question can be given as:

Code:

1)

2 arrays that used to store 10 employee identification number and grosspay amount in parallel and its data-type is int and double.

int Employee_id[10]; //array that store integer value

double Weekly_Gross_Pay[10]; //array that store double value

2)

Define loop for print the details of employees’ identification number and weekly gross pay.

for(int i=0; i<10; i++)  

{  

cout <<Employee_id[i] <<" " << Weekly_Gross_Pay[i] << endl;  

}

Explanation:

The explanation of the above code can be given as:  

In Code (1) we declare two array that's data-type is integer and double. In Employee_id array it store the integer values and Weekly_Gross_Pay it store the double value.

In Code(2) It is used to print the value of array. In that code, we used for a loop because of its entry control loop and we know the size of the array. In this loop, we declare a variable (i) and initialized the value 0 and check the condition(i)less than 1 and increment of i. It prints all the 10 values.  

You might be interested in
The internet is ________. an internal communication system for businesses a large network of networks a communication system for
uranmaximum [27]

A large network of networks

<h3>What Is a large network?</h3>
  • It is the biggest network that connects computers across the world. With the internet, people can share data and files over the internet. The Internet is defined as a network of networks Hence it is the correct option

To learn more about the network, refer

to https://brainly.in/question/32165678

#SPJ4

4 0
2 years ago
Which two settings must you configure when fortigate is being deployed as a root fortigate in a security fabric topology?
Goryan [66]

The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices.
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

<h3>What is security fabric settings?</h3>

The term Security Fabric is known to be a tool that aids one or allows one's network to be able to automatically see and also dynamically isolate any kinds of affected devices.

Note that is one that can also partition network segments, update rules, and they can bring out new policies, and delete malware.

Hence, The two settings that one must configure when fortigate is being deployed as a root fortigate in a security fabric topology are:

  • Option A. Enables you to view the logical and physical topology of Security Fabric devices
  • Option  C. Enables you to view the security ratings of FortiGate Security Fabric groups.

See full question below

Which two Security Fabric features are on FortiManager? (Choose two.)

Select one or more:

A. Enables you to view the logical and physical topology of Security Fabric devices

B. Enables you to run security rating on FortiGate devices

C. Enables you to view the security ratings of FortiGate Security Fabric groups

D. Enables you to view and renew Security Fabric licenses for FortiGate devices

Learn more about security from

brainly.com/question/25720881

#SPJ1

8 0
2 years ago
If you are asked to design an optimal workflow using technology for a car accident claim process, what factors would you conside
yan [13]

Answer:

The factors to consider when building a solution for optical workflow for car accident are the type of claim to be modelled, also to examine the level of automation in vehicles.

Some of the software solutions that meet the requirements are the A1 Tracker  which is very effective to the enterprise business and small business working with insurance. we also have the Mutual expert, Ninja Quote.

Explanation:

Solution

In suggesting an optical workflow for the car accident claim process it is of importance to understand the following factors such as, the type of claim to be modelled, it will be determined by the policy that the clients have for their cars. this will assist in classifying the workflow and giving a clear path of the design.

The number of expected claims is also a very important factor that should be added in the design. Another important factor to examine  the level of automation of the vehicles, this can be very useful in collecting the accident data in a more efficient way and also making it simple to design the model.

Presently there are several workflow softwares in the insurance that have encouraged a great deal and have made the workflow in the insurance companies more greater.

Some of the soft wares are the A1 Tracker  which are very effective and efficient in are highly applicable to the enterprise business and small business working with insurance, the software is convenient in monitoring the work progress in the company.

The other soft wares that have been quite useful in the industry for example the Insly, ISI enterprise, Mutual expert, Ninja Quoter among others. These software are some of the best soft wares available in the market that have met the workflow requirement in the insurance sector.

7 0
3 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Which of these is the best example of an asset?
ArbitrLikvidat [17]

I believe it's the second answer:

The antique diamond necklace someone is wearing

5 0
3 years ago
Other questions:
  • 3. If B3=6 and D5=8, what would the following function return? IF(B3&gt;D5, "Closed", D5-B3) *
    10·2 answers
  • Ill give you brainiest.
    9·1 answer
  • What common communication devices are used in homes to connect to the internet and remote networks and what capabilities do thes
    10·1 answer
  • A girl scout troop with 10 girl scouts and 2 leaders goes on a hike. When the path narrows, they must walk in single file with a
    12·1 answer
  • Each processor core on a multi core processor generally runs faster than a single core processor
    14·2 answers
  • Explain why there is an overlap of skills and qualities in design professions​
    14·1 answer
  • Adam is using the software development life cycle to create a new game. He made an outline of what functionality the game will r
    13·1 answer
  • You insert a comment in a worksheet by using a command on the ____ tab on the Ribbon.
    13·1 answer
  • Drag each tile to the correct box.
    15·1 answer
  • You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!