1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
3 years ago
6

How does a main program recieve info from a function in c++?

Computers and Technology
1 answer:
Mashcka [7]3 years ago
8 0
Main() is a user defined function from where execution of C/C++ programs start. It is the designated entry point to a program that is executed in an operating system. There must be at least one main() function in e<span>very C++/C program. A main program receive info from another function by writing the command int and then the name of the function and the parameters.</span>
You might be interested in
Which clauses in the Software Engineering Code of Ethics are upheld by a whistleblower (check all that apply). "Respect confiden
valkas [14]

Answer:Discloses actual/potential dangers

              Help create an environment supporting ethical conduct

Explanation: The clauses that are presented by the Code of Ethics for software engineering which are upheld by a whistle blower are termed as  1.03, 1.04 and 6.08.These describe about the below mentioned terms:-

  • 1.03-it gives permission to software by receiving assurance that it meets the requirement, protected , good qualities and other such testable factors.
  • 1.04- Disclosing to the correct and reliable person regarding any potential danger towards the user.
  • 6.08- reporting errors and malicious activities, detecting it  ,correcting those errors etc so that software conduct can work smoothly.

4 0
3 years ago
Ben assembled parts of a computer and created a fully functional desktop PC. He wants the computer to connect to the Internet. W
Burka [1]
Network interface card. or NIC for short
5 0
4 years ago
The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
Helga [31]

Answer:

Option(d) is the correct answer to the given question .

Explanation:

There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The  main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.

  • The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.
  • The Option (b) is wrong because In the key scheduling  we do not used the  the random key for the encryption process .
  • The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.

3 0
3 years ago
The blank contains the computer's brain the central processing unit CPU
Ipatiy [6.2K]

The central processing unit (CPU), also called a processor, is located inside the computer case on the motherboard. Hope it helps (:

6 0
3 years ago
Write a program in c++ to displaypascal’s triangle?
Harman [31]

<u> C++ Program to Print Pascal's Triangle</u>

 #include<iostream> //header file

using namespace std;

//driver function  

int main()

{

   int r;/*declaring r for Number of rows*/

   cout << "Enter the number of rows : ";

   cin >> r;

   cout << endl;

 

   for (int a = 0; a < r; a++)

   {

       int value = 1;

       for (int b = 1; b < (r - a); b++) /*Printing the indentation space*/

       {

           cout << "   ";

       }

       for (int c = 0; c <= a; c++) /*Finding value of binomial coefficient*/

       {

           cout << "      " << value;

           value = value * (a - c) / (c + 1);

       }

       cout << endl << endl;

   }

   cout << endl;

   return 0;

}

<u>Output</u>

<u>Enter the number of rows :  5</u>

                 1

              1      1

           1      2      1

        1      3      3      1

     1      4      6      4      1

7 0
3 years ago
Other questions:
  • What has prompted schools to add Internet activities in their academic integrity policies?
    11·2 answers
  • It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
    14·1 answer
  • Using underlining and italics at the same time is which of these? A. allowed but might be overkill B. always a good idea C. not
    15·2 answers
  • What is the output of 1101 x 10 == 11000 + 10?
    12·1 answer
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • Write a method for the Customer class that that will return a string representing a bill notice when passed a double value repre
    14·1 answer
  • What is an operating system? What are the main functions of a modern general purpose operating system?
    7·1 answer
  • which statement is true? O A Future games will be more context oriented. OB. Future games will be more product driven. Future ga
    13·2 answers
  • What do you consider to be the next big thing in "Small Systems" (technology, hardware, software, etc.) and why?
    10·1 answer
  • Which statement is true about the energy of electromagnetic radiation?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!