1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Margaret [11]
3 years ago
9

Write the definition of a function isEven, that receives an integer parameter and returns true if the parameter's value is even,

and false otherwise. So, if the parameter's value is 7 or 93 or 11 the function returns false. But if the parameter's value is 44 or 126 or 7778 the function returns true.
Computers and Technology
1 answer:
seropon [69]3 years ago
3 0

Answer:

<em>C++</em>

//////////////////////////////////////////////////////////////////////////////////

#include <iostream>

using namespace std;

/////////////////////////////////////////////////////////

bool isEven(int n) {

   if (n%2 == 0)

       return true;

   else

       return false;

}

/////////////////////////////////////////////////////////

int main() {

   if (isEven(100) == 1)

       cout<<"True"<<endl;

   else

       cout<<"False"<<endl;

   if (isEven(61) == 1)

       cout<<"True"<<endl;

   else

       cout<<"False"<<endl;

   return 0;

}

You might be interested in
Under the common criteria, which term describes the user-generated specifications for security requirements?
Irina-Kira [14]

The correct answer to this question is the:

“Protection Profile (PP)”

<span>According to the ISO/IEC 15408 and the Common Criteria (CC), the Protection Profile (PP) is a document used as a part of the certification process. And since it is a generic form of a Security Target (ST), this makes it a typical creation by a user or a community of users.</span>

6 0
4 years ago
If one employee is assigned to a project and each project has only one employee working on it, there is a(n) ____ relationship b
Len [333]

Answer:

One-to-one is the answer because there is one project and one employee working on one project.

5 0
3 years ago
1. A formula =A1+B2 is in cell D8. If you copy that formula to cell D9, what is the new formula in cell D9?
MaRussiya [10]
1. Answer is B   (D9=<span>A2+B3)
2. </span><span>C. identifies how many cells with data were in the range 
3. </span><span>A. ascending (smallest to largest)
</span><span>4. A. the current worksheet </span>
6 0
3 years ago
After making a PowerPoint presentation about a new line of clothing designs, Henri notices that he used the word “gorgeous” on n
sineoko [7]

The spell checker and thesaurus are not underneath the view tab, so 1 and 2 are wrong.

If you replace every instance of the word gorgeous, then you would not be adding variety. So d is incorrect.

Therefore:

The only correct answer is C, as it is correct navigation and it adds word variety.

8 0
4 years ago
Two technicians are discussing using a lift to raise a vehicle. Technician A says to be sure the lift pads on the lift are conta
lianna [129]
Its B no doubt
cuz ik how to do this i took classes for this so ik im right ight
6 0
3 years ago
Read 2 more answers
Other questions:
  • Write an UPDATE statement that modifies the InvoiceCopy table. Change the PaymentDate to today’s date and the PaymentTotal to th
    7·1 answer
  • Where can you access all the formatting options for worksheet cells?
    5·1 answer
  • A poem for coduction
    15·2 answers
  • Write a C++ program that overloads a function named LinearSearch that searches an array of data of either integer data type, flo
    8·1 answer
  • How can I collect tweets from different accounts concurrently and categorize the tweets in a corpus?
    15·1 answer
  • Which group and tab do you need to be in to separate text into two columns? Paragraph group and Insert tab Page Layout group and
    8·1 answer
  • In PowerPoint, Jake wants to change the slide background to a photo on his computer. He is walking through a tutorial given to h
    7·1 answer
  • Project: Big Data Programming - Section 2
    11·1 answer
  • Need help not sure if I’m correct
    5·1 answer
  • A company has employees who write down passwords, which should be kept private, on sticky notes. Given this scenario, what shoul
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!