1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
4 years ago
8

Given the availability of an ofstream object named output, write the other statements necessary to write the string "3.14159" in

to a file called pi. (Do not define a main function.)
Computers and Technology
1 answer:
mixas84 [53]4 years ago
4 0

Answer:

The statements are given below:

output.open("pi"); // opening the file by the of stream object

output << "3.14159";  

output.close(); // closing the file  

Explanation:

In this we open the file with the help of output stream object .The statement output.open("pi"); is opening the file after after opening the file "pi". The output object print the 3.14159 message in console and finally the output stream file is close with the help of output.close() statements .

You might be interested in
Write keyboard shortcut to insert footnote and endnote​
loris [4]

Answer:

Alt + Ctrl + F to insert a footnote.

Alt + Ctrl + D to insert an endnote.

Correct me, if I am wrong :)

Have a great day!

Thanks!

5 0
3 years ago
An organization is using Amazon CloudWatch Logs with agents deployed on its Linux Amazon EC2 instances.
Bumek [7]

Answer:

A and B

Explanation:

EC2 run command gives a management output to review various instances and servers. Here, the logging files, collecting metrics and patches, running script installations can be achieved.

Verify the user permission and the run command, confirms if whether or not the problem of missing logging files is from the settings.

There are several AWS and customer managed policies for cloudwatch logs to give users certain levels for permission. Verifying this determines if there is full access, group logs and creation of group log events, or even a read only access.

4 0
3 years ago
IoT is the interconnection of what?<br> Hardware<br> Networks<br> Everyday devices<br> Cables
Dominik [7]

Answer:

Everyday Devices

Explanation:

As we know that Internet of Things (IOT) include connected security systems, thermostats, cars, electronic appliances, lights in household and commercial environments, alarm clocks, speaker systems and vending machines.

3 0
4 years ago
Which part of the software hierarchy is working behind the scenes allowing programs to perform tasks?
Svetradugi [14.3K]
The right answer for the question that is being asked and shown above is that: "Currently dispatched threads." The  part of the software hierarchy is working behind the scenes allowing programs to perform tasks is that <span>Currently dispatched threads</span>
5 0
4 years ago
Panarchy considers the big picture because, in reality, smaller systems are embedded inside of larger systems and they influence
SVEN [57.7K]

Answer:

The connection will be represented by the pair of "Revolt" and "Remember".

Explanation:

  • In a nested structure, the panarchy system links the evolutionary periods. Several connections may have occurred between levels at one point of the engineered process and stages at another.The tags ' revolt ' and ' remember ' are two major connections.
  • Invent, explore, and check the smaller, quicker, clustered levels, while the bigger, slower rates preserve and maintain stored system dynamic allocation.
  • The slower and larger levels, therefore, set conditions under which quicker and smaller ones work.

Therefore, it's the right answer.

4 0
4 years ago
Other questions:
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, sea
    12·1 answer
  • Why does the job market change overtime
    9·1 answer
  • What your computer can do to you?
    14·2 answers
  • What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • When you use a rest area, you should:
    7·2 answers
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • write code that removes the first and last elements from a list stored in a variable named my_list. assume that the list has bee
    13·1 answer
  • Write a program that can add, Subtract, multiply and divide entered numbers. <br>​
    11·1 answer
  • What dictionary operation can you use to remove all the keys within the dictionary-named contacts?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!