1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
9

.Write a C++ program that displays your name and address (if you value your privacy, a fictitious name and address).

Computers and Technology
1 answer:
olga_2 [115]3 years ago
5 0

Answer:

#include <iostream>

using namespace std;

int main() {

   cout<<"My name is Rajat Sharma"<<endl<<"My address is Flat no=23 GH=5 Paschim Vihar New Delhi 110087 India"<<endl;

return 0;

}

Explanation:

The program is written in C++ language.In the program I have used cout to print my name and the address.First the name will be printed then the address in the new line endl is used for new line.To print any sentence just put them in double quotes.The same sentence in the program will be printed on the screen.

You might be interested in
A disgruntled employee can harm a company by launching a computer virus, changing or deleting files, or exposing system password
Setler [38]

Answer:

Threat disgruntled employees

Explanation:

This is a type's threat in a network, why disgruntled employees is a threat?

Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.

I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.

In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.

5 0
3 years ago
Software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundam
alukav5142 [94]

Answer:An operating system, or "OS," is software that communicates with the hardware and allows other programs to run. It is comprised of system software, or the fundamental files your computer needs to boot up and function.

Explanation:

8 0
2 years ago
Although fun and entertainment are the primary functions of video games, they have other uses, as well. An
Zigmanuir [339]

The problem that you think could be addressed by using video games is financial  management skills.

<h3>What problem does gaming handles?</h3>

A lot of Scientific research have seen that video games improve people's creativity and also their skill in terms of problem-solving skills.

Note that it can also help to improve financial management skills and also make people to have stable jobs and good source of income.

Learn more about video games from

brainly.com/question/8870121

6 0
1 year ago
10. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
Neporo4naja [7]

Answer:

It is done to avoid collision among the channel.

Explanation:

CSMA/CD stands for carrier sense multiple access/collision detection.

It is a media access protocol that tells the devices how to respond when a channel is used simultaneously by two devices. The main purpose is to manage the transmission when a collision is encountered.

In the given scenario when the channel is detected idle, the station does not transmits second frame in order to avoid collision. CSMA/CD protocol is designed so that after transmission of first frame, second frame transmission is started at step 2 instead of step 1.

Following is given the flow chart that depicts the working of the protocol CSMA/CD:

<h2> I hope it will help you!</h2><h2 /><h2 />

7 0
3 years ago
When you store files "in the cloud", you are __________.<br><br> I kinda need the answer now
Angelina_Jolie [31]
Putting them online? what are the answers to choose from?
7 0
3 years ago
Other questions:
  • If you are installing separate anti-virus and anti-spyware programs, which should you install first
    7·1 answer
  • How can you tell if a website is secure
    13·1 answer
  • What is the best way to protect against the loss of important files
    15·1 answer
  • Which of the following keywords is used to remove a row in a table? (Points : 2) DROP
    11·1 answer
  • Write a definition in your own words for intranet. Please don't copy and paste.
    7·2 answers
  • Guys how can i video my self from my laptop <br> my laptop is (lenovo)
    8·2 answers
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
  • Limitations of systems analysis and design​
    13·1 answer
  • When adding a component to a container with the ____ layout, specify the NORTH, EAST, SOUTH, WEST, or CENTER position.
    8·1 answer
  • Using programming libraries is one way of incorporating existing code into new programs.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!