1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dezoksy [38]
3 years ago
14

Assume that name and age have been declared suitably for storing names (like "abdullah", "alexandra" and "zoe") and ages respect

ively. write some code that reads in a name and an age and then prints the message "the age of name is age." where name and age are replaced by the values read in for the variables name and age. for example, if your code read in "rohit" and 70 then it would print out "the age of rohit is 70", on a line by itself. there should not be a period in the output
Computers and Technology
1 answer:
schepotkina [342]3 years ago
7 0

Answer:

Explanation:

It is assumed that name and age have been declared suitably for storing names and ages. so the following is the code to read in a name  and age and printout the message "the age of name is age. "

cin >> Name;

cin >> Age;

cout << "The age of " << Name << " is " << Age << ".";

You might be interested in
When a business is using methods that help it use its time and resources the best they can, what are they exercising?
maria [59]
<span>B. Efficiency

(</span><span>effective training </span><span>techniques)</span>
3 0
3 years ago
Read 2 more answers
Describe four features of a well designed input screen
Sladkaya [172]

Answer:

A well design input screen should:1.Be titled2.Navigation aids should be used

Explanation:

3 0
3 years ago
Read 2 more answers
What is the advantage of video conferecing
Svet_ta [14]

some advantages of video conferencing include:

• you can talk no matter how far you are from the person

•you won’t have to go somewhere to talk

•there is no cost if you need to travel far

7 0
3 years ago
Read 2 more answers
A network technician is setting up a wireless access point in the front office of a small company. The technician needs to disab
VladimirAG [237]

Answer:

He should disable UPnP technology to disallow devices to dynamically add themselves to the network without configuration.

Explanation:

  • UPnP stands for Universal Plug n Play.
  • It is an easiest way that allows gadgets to find all other devices connecting to your network.
  • This can also modify router settings to allow devices from outside the network to access the router.
  • External IP address can also be obtained by the gadget and a new port forwarding map can be set
  • So from all perspectives, UPnP is an open invitation for hackers to scan for the ports and hack into the device.
  • UPnP is a vulnerability to the secure system
6 0
3 years ago
Value appears on the left hand side of cell <br> true or false
11111nata11111 [884]

Answer:

True

Your welcome

.........

4 0
3 years ago
Read 2 more answers
Other questions:
  • Every time I try to look up anything on my laptop it keeps saying my connection is not priavte what do I do
    6·2 answers
  • Select all that apply. To select more than one worksheet at the same time, which of the following keys on your keyboard can you
    11·1 answer
  • Which is an example of correct HTML?
    10·1 answer
  • Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o
    7·1 answer
  • Who created the first photograph
    9·2 answers
  • How has your perspective changed since the beginning of the class?
    5·1 answer
  • ¿que significa “TTAQMMQMPDATLSPLNDTMGCCLFEQMMPQTEIUMDR” ?
    5·2 answers
  • A technology _________ occurs when the ability of a company to operate is impaired because of a hardware, software, or data outa
    7·1 answer
  • Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
    15·1 answer
  • each data mining technique has its advantages and limitations. which data mining technique mimics the neural structure of the br
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!