1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Llana [10]
3 years ago
5

Suppose that the content of the input file is: 14 13 26 8 -11 36 0 -1. What is the output of the following code? ifstream myInfi

le; myInfile.open("input.txt"); int value; int sum = 0; for (int x = 0; x < 8; x++) { myInfile >> value; if (value % 2 == 0) sum = sum + value; } cout << sum << endl;
Computers and Technology
2 answers:
Andreyy893 years ago
5 0

Answer:

 

Explanation:

n

tester [92]3 years ago
3 0
I do not know, i really hope you dont fail!!!!!!!!!
You might be interested in
Olivia wants to change some settings in Outlook. What are the steps she will use to get to that function? open Outlook → File →
Rainbow [258]

Answer:

C.

Explanation:

edg 2020

3 0
3 years ago
Read 2 more answers
Why header files are needed in every c program ?expalin​
bonufazy [111]

Answer:

Header files serve two purposes. System header files declare the interfaces to parts of the operating system. You include them in your program to supply the definitions and declarations you need to invoke system calls and libraries.

6 0
2 years ago
While a remote assistance session is in progress, what keyboard key(s) can the requestor press to terminate the connection?
o-na [289]

ESC key can the requestor press to terminate the connection.

<h3>what is the ESC key?</h3>
  • The European Society of Cardiology is a professional organization that strives to increase scientific knowledge of the heart and vascular system as well as the prevention, diagnosis, and treatment of disorders of the heart and blood vessels.

To learn more about ESC key, refer

to brainly.com/question/25689052

#SPJ4

8 0
2 years ago
Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: 1) it is computa
rosijanka [135]

Answer:

C.

Explanation:

7 0
3 years ago
Convert ⅖ pie radian to degree​
aniked [119]

Answer:

Convert to a decimal.

22.9183118°

Explanation:

7 0
3 years ago
Other questions:
  • Which method of deleting files can be used in windows xp and vista?
    12·1 answer
  • When projecting a presentation on a large screen, what should your minimum font size be?
    6·2 answers
  • What items do you keep in a data base
    5·1 answer
  • ________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are
    10·1 answer
  • David would like to send a letter to more than one hundred people. He would like the letter to have names and addresses inserted
    12·2 answers
  • In order for bitlocker to protect the system volume without the aid of an external drive, your computer must:
    12·2 answers
  • Which are the best examples of cost that should be considered when creating a project budget
    14·1 answer
  • In Python what are the values passed into functions as input called?
    13·1 answer
  • Exercise 3.6.9: 24 vs. "24"5 points
    7·1 answer
  • Write a short note on Ms - Excel...​..
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!