1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kaylis [27]
3 years ago
5

Assume that the type NAME has already been defined. Define a new type, SREC that is a structure consisting of two fields: name (

a NAME) and grade (a string).
Computers and Technology
1 answer:
belka [17]3 years ago
5 0

Answer:

struct SREC

{

       NAME name;

       string grade;

};

Explanation:

The first line declares a new data type, a structure, of name SREC. The open and close braces, are used to contain other data fields or members, namely: name and grade variables.

The NAME has already been defined, hence there is no declaration method in the SREC structure.

You might be interested in
Phil wants to make a dark themed superhero movie. What could be his target demographic
maria [59]

Answer:

d

Explanation:

i think, because it makes the most sense to me.

5 0
3 years ago
Read 2 more answers
What type of font color should Kim select if she chooses a dark-colored design theme for her presentation?
Gnesinka [82]

ANSWER: Kim has chosen a dark-colored design theme for her presentation. She should therefore choose <u>a bright </u> font color that will <u>contrast with  </u>the background color.

5 0
4 years ago
Read 2 more answers
Which step of creating a financial budget involves listing the payroll, rental, and utility costs?
Bingel [31]

Answer:

A. planning and gathering financial information

4 0
4 years ago
Read 2 more answers
You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom
Phantasy [73]

Answer:

c. your friend can hash all possible options and discover your secret.

Explanation:

SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.

6 0
3 years ago
Every workplace should have an emergency plan of action.
pochemuha

Answer:

yes i agree with that the answer is in fact true

Explanation:

follow my in sta gram at grac.ehihi

6 0
3 years ago
Read 2 more answers
Other questions:
  • What role do career pathways play?
    11·2 answers
  • You could be electrocuted if you try to use water to put out a
    14·2 answers
  • What are features of a product?
    8·2 answers
  • What is a traffic controller?what are its functions?
    13·1 answer
  • The following relation schema can be used to register information on the repayments on micro loans.
    13·1 answer
  • What is the output of the following program?
    10·1 answer
  • The elements in a long array of integers are roughly sorted in decreasing order. No more than 5 percent of the elements are out
    12·1 answer
  • How do the following technologies help you with your quest to become a digital citizen kiosks enterprise computing, natural lang
    13·1 answer
  • What are some legal issues that can arise from the use of social media?
    10·1 answer
  • If you give someone ______ to your device, they can control it through another phone or computer.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!