1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
9

I am trying to figure this out but every type of coding I put in has errors or it states that the things aren't the same. This c

oding is being done in C++.
Get a line of text from the user. Output that line. (1 pt) Ex: Enter text: IDK how that happened. TTYL. You entered: IDK how that happened. TTYL. (2) Output the line again, this time expanding common text message abbreviations. (5 pts) Ex: Enter text: IDK how that happened. TTYL. You entered: IDK how that happened. TTYL. Expanded: I don't know how that happened. talk to you later. Support these abbreviations: BFF -- best friend forever IDK -- I don't know JK -- just kidding TMI -- too much information TTYL -- talk to you later Note: If an abbreviation appears twice, only expand its first instance.
Computers and Technology
1 answer:
MrMuchimi3 years ago
8 0
How might a company go about performing a load test on their website?
You might be interested in
It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half op
solong [7]

Answer:

SYN flood attack.

Explanation:

Doing this is a symptom of an SYN flood attack. Attackers performing this type of DoS attack will try and open as many connections as possible but never fully finish the connection. This ultimately causes the system to use all of its computing power to try to resolve these failed connections which would cause the system to crash or become unresponsive. Therefore, denying service to potential clients if done correctly. This is just one of the many types of DoS attacks that exist.

8 0
3 years ago
True or false: if we’re short side the subject in our composed frame, we have given the subject the maximum amount of “lead room
denis-greek [22]
I think it’s false I’m not to sure
3 0
3 years ago
Whenever you communicate online, remember a. to delete anything you don't want to keep b. everything you put online is available
maxonik [38]

Answer:

B-Everything you put online is available forever. Messages or photos will never be permanently deleted from memory cards on cameras or cell phones.

5 0
3 years ago
When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
Naya [18.7K]

Answer:

a. file-naming conventions

Explanation:

File names need to follow certain criteria and constraints. Examples include:

  • File names must not start with special symbols.
  • File names can consist of letters,digits and special characters such as _.
  • File name can contain an extension after a dot sign.
  • File names must not be duplicates of an existing file.

Such constraints form part of file-naming conventions.

  • file-path represents the complete path to the file in the directory structure.
  • disk partition segments a hard disk into multiple volumes.
  • file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.
6 0
3 years ago
In an emergency supply kit there should be __________ per person per day for __________ and __________ A. 1 gallon of water / dr
drek231 [11]
The answer would be A.) a gallon or water for drinking and sanitation
5 0
4 years ago
Other questions:
  • In the lab, you performed an asset identification and classification exercise by creating a(n) __________ organized within the s
    10·1 answer
  • which of the following is involved in ordering an outline. A.grouping B.merging C.organizing D.arranging
    10·1 answer
  • Atari licensed a game from taito that became a smash-hit and helped sell the vcs/2600. what is the name of that game?
    14·2 answers
  • Why we called COBOL as a professional language and not ataught language.(
    13·1 answer
  • Which type of memory helps in reading as well as writing data? With the help of , a computer can read as well as write or modify
    11·3 answers
  • Windows 8 has a built-in antivirus program called
    10·1 answer
  • Match the index with the value
    14·1 answer
  • What are some benefits that each computer system being used?
    12·2 answers
  • How to download film​
    14·2 answers
  • When you start a new, blank document, you usually end up changing the font to arial 11. 5 point. How can you make these settings
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!