1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nimfa-mama [501]
3 years ago
14

For C++ (please make sure it runs properly)

Computers and Technology
1 answer:
Jlenok [28]3 years ago
7 0

Answer:

The C code is below.

Explanation:

#define amplitude 1

02     #define b 1

03     #define c 200

04     class Sinewave

05     {

06     protected:

07

08                 double freq;

09                 int y;

10

11     public:

12                 Sinewave()

13                 {

14

15                 }              

16                 void generateSinewave()

17                 {

18                     COLORREF yellow = RGB(255,255,0);

19                     COLORREF lightblue = RGB(173,216,230);

20

21                     // make sure the names match

22                     SetConsoleTitle(L"ConGraphics");

23                     HWND hWnd = FindWindow(NULL, L"ConGraphics");

24                     HDC hDC = GetDC(hWnd);

25

26                     //for(int x = 0; x < freq; x++)

27                     for(int x = 0;; x++)

28                     {

29                         // center at y = 200 pixels

30                          

31                         y = amplitude*(int)(sin(x/100.0)*100 + 150);

32                         SetPixel(hDC, x, y, lightblue);

33                          

34                          

35                     }

36                      

37                 }

38 };

You might be interested in
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
GalinKa [24]

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. <u>VPN </u> software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Explanation:

  • A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet.
  • VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. .
  • Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the internet. VPNs aren't just for desktops or laptops, you can set up a VPN on your iPhone, iPad or Android phone.
  • A VPN encrypts the traffic from your machine to the exit point of the VPN network. A VPN isn't therefore likely to protect you from an adversary like Anonymous.
  • VPNs add another layer of encryption to your internet traffic, your latency will go up and speeds will go down.

3 0
3 years ago
What could be the reasons of Blue Screen of Death on Windows computers?
muminat

Answer:

The reasons for  Blue Screen Of Death are as following:-

  1. Faulty Memory.
  2. Power Supply Issue.
  3. Overheating of Components.
  4. Malfunctioning Hardwares.
  5. Poorly coded device drivers.
  6. Hardware runnign beyond it's capacity.
  7. Bugs in the Operating System Kernel.

These are the some of the reasons why the blue screen of death is caused.

6 0
3 years ago
How is technology used in the voting process?
Semmy [17]
Each person has a electronic chip-enabled ID card, which lets them vote on the internet. The ID card is put into the card reader that is connected the computer. :)
7 0
2 years ago
Explain why regular system cleanup is vital to ensuring the operating system runs efficiently.
Monica [59]
Cleaning up a system helps clear up the space on the drives. It may also clear up processor usage, ram usage if you uninstall programs that automatically started when the system booted. You may also delete some unwanted programs in the process.
6 0
3 years ago
A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/I
Ymorist [56]

Answer: Transport layer

Explanation: The Transmission Control Protocol / Internet Protocol both combine to aid aod transmission of data through the internet. While the Transmission control protocol handles the establishment and Maintainace of network connection through applications , the Internet Protocol handles how the established data is being sent. The Transmission Control Protocol is forms a part of the transport layer which aids in the data transmission m ensuring that data is sent to the correct source. The transport layer is able to avoid errors as it ensures that established c is nnectio is maintained until data exchange is complete.

8 0
2 years ago
Other questions:
  • A(n) ____________________ stores copies of data or programs that are located on the hard drive and that might be needed soon in
    9·1 answer
  • The unique global address for a web page or other resource on the internet is called the ________.
    7·1 answer
  • Physical activity such as sports or even a brisk walk can help reduce
    7·2 answers
  • A7DF is the hexadecimal representation for what bit pattern?
    8·1 answer
  • Four-pair UTP uses ________ connectors a)snap b)ST or SC c)None of these
    12·1 answer
  • ____ involves taking data from your database and putting it into an electronic file in a format that another external applicatio
    9·1 answer
  • Which os the following is NOT true about the proof of work concept?
    8·1 answer
  • What is an example of a hard skill?
    12·2 answers
  • Write a simple hello world program in python 3
    8·2 answers
  • Goals of the project objectives
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!