1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flura [38]
3 years ago
5

The Thing method printMessage prints a string consisting of the name of the object followed by "_is_great". Suppose the name of

the Thing object favFood is "pizza". Write a statement that uses the printMessage method to print the string "pizza_is_great". Write the statement below.
Computers and Technology
1 answer:
Harman [31]3 years ago
4 0

Answer:

Written in C++

The statement that prints the required output is:

<em>printMessage(favFood); </em>

Explanation:

The full program is with comment is:

#include<iostream>

using namespace std;

//The method begins here

void printMessage(string favFood){

//This line prints the required output

cout<<favFood<<"_is_great";

}

//The main method starts here

int main()

{

//This line declares favFood as string

string favFood;

//This line prompts user for input

cout<<"Food: ";

//This line gets the input

cin>>favFood;

//This line calls the printMessage method

printMessage(favFood);

return 0;

}

You might be interested in
I need 3 sentences on adware.<br> What they do and how they are a risk.
Andru [333]
Adware displays unwanted advertisements, often re-directing you to malicious sites.
Adware also can display inappropriate content, to which children can be exposed to.
Adware can re-direct you to sites that automatically download Trojans and other viruses/malware.
7 0
3 years ago
What happens when the computer is thrashing? quizzlet?
lutik1710 [3]
When computers need to use more memory than have RAM, they'll swap out pages of memory to their drive. When they need those memory pages, they'll swap out others and swap in the needed ones. If a computer needs enough additionall memory, it can get so busy swapping that it doesn't have any (or very little) time to do any useful work. That is called thrashing.

Unix calls swapping swapping. Windows calls it paging, probably because of the memory pages. Memory pages are 4096 (4KB) sections of memory.

Unix drives are usually partitioned with a swap partition, and swap files can be made in the filesystem. Windows just has pagefiles[s].
5 0
3 years ago
What are some of the ways you can use bitlocker encryption? (choose all that apply?
nasty-shy [4]
Bitlocker Encryption can be used during the process of authenticating your computer with a TPM, during the process of authenticating your account with a USB flash drive, and most of the authentication through text messages.
3 0
3 years ago
Write a SELECT statement that selects all of the columns for the catalog view that returns information about foreign keys. How m
Nutka1998 [239]

Answer:

SELECT COUNT (DISTICT constraint_name)

FROM apd_schema.constraint_column_usage

RUN

Explanation:

General syntax to return a catalog view of information about foreign keys.

SELECT DISTINCT PARENT_TABLE =

           RIGHT(Replace(DC.constraint_name, 'fkeys_', ''),

           Len(Replace(DC.constraint_name, 'fkeys_', '')) - Charindex('_', Replace(DC.constraint_name, 'fkeys_', ''))),

           CHILD_TABLE = DC.table_name,

           CCU.column_name,

           DC.constraint_name,

           DC.constraint_type

FROM apd_schema.table_constraints DC

INNER JOIN apd_schema.constraint_column_usage CCU

           ON DC.constraint_name = CCU.constraint_name

WHERE  DC.constraint_type LIKE '%foreign'

           OR DC.constraint_type LIKE '%foreign%'

           OR DC.constraint_type LIKE 'foreign%'

RUN

6 0
4 years ago
A technician removes the cap from the brake fluid reservoir and finds that the rubber boot in the cap is swollen. technician a s
uysha [10]

Technician A is correct, there could be water or other contaminant in the brake fluid reservoir. The swollen cap needs to be replaced, some sell only the rubber part of the cap which could help save you money.

5 0
3 years ago
Other questions:
  • The second row of letters on the keyboard is called the______ row
    14·2 answers
  • 4. The same data source can be used multiple times in creating mail-merge documents.
    7·1 answer
  • . One of the vulnerabilities the Morris worm used was a networking service called finger. The purpose of the finger service is t
    11·1 answer
  • The equation x + y2-4x+2y=b describes a circle.
    8·1 answer
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • There is usually a positive side and a negative side to each technology improvement. Select a technology you use every day and c
    5·1 answer
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • A write once, read many (worm) disc is a common type of _____.
    6·1 answer
  • Ranboo back story? (not homework i just wanna find some ppl who are interested in the same things) ft. the reddie meme
    9·2 answers
  • Which statement about analog and digital images is true?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!