1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ss7ja [257]
3 years ago
15

How can templates be made available to other users?

Computers and Technology
1 answer:
Daniel [21]3 years ago
4 0

Answer:

b

Explanation:

You might be interested in
Assume user_name equals "Tom" and user_age equals 22. What is printed on the console when the following statement is executed? c
12345 [234]

Answer:

The ouput of the given code is :

22

is "Tom's age.

Explanation:

Here in this code the variable user_name and user_age are initialized to  "Tom" and 22 respectively as statement is given in the question i.e  cout << user_age << " \nis " + user_name << "'s age.";.This line will print the user_age i.e 22 after that the control moves to the next line and print is "Tom's age.

Following are the code in c++

#include <iostream> // header file

#include <string>

using namespace std;

int main() // main function

{

   string user_name="Tom";

   int user_age= 22;

cout << user_age << " \nis " + user_name << "'s age.";

return 0;

}

Output:

22

is "Tom's age.

8 0
3 years ago
Is a book considered technology?
kumpel [21]
Yes, "technology" doesn't have to be all about computers or cell phones.. Technology is anything that is a new advance in knowledge and books were once a great advance in that field.
7 0
4 years ago
Read 2 more answers
In which type of attack do you get malicious code in links from seemingly reliable websites?
natali 33 [55]

I think it is C. cross-site scripting

6 0
3 years ago
Network Architecture and Topology: Mastery Test
trasher [3.6K]

Answer:

You need to understand all the network typologies and the devices that we use in the Computer networks. You also use the techniques like routing, masking, firewalls, VPN, as well as the network protocol. And recently added is the PKI. And hence you need to make sure that you know all these, and you should also know ipv4 and ipv6. Rest you can consult Tanenbaum for further studies on Computer Network.

Explanation:

Please check the answer.

4 0
3 years ago
A derived class is a class that inherits data members and functions from a ____ class.
mezya [45]
The answer is superclass
6 0
3 years ago
Other questions:
  • Helping people keep track on things is the purpose of_____ A database B table C query D form​
    12·1 answer
  • Why is it important to protect people's intellectual property online?
    10·1 answer
  • //Display message Module main () // Declare variables Declare real weight Declare real shipping //Get package weight Call getWei
    7·1 answer
  • Who is a second-degree contact on a professional networking profile?
    12·1 answer
  • At the beginning of a chapter in a book, the first letter often appears larger than the other text on the page. This
    15·1 answer
  • Explain how to utilize the computer in rooms management.​
    13·1 answer
  • Briefly describe the traditional definition of the digital divide. What is it and who is affected, positively and adversely? How
    15·1 answer
  • HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
    12·2 answers
  • Fill in the blanks with the correct words.
    7·1 answer
  • write an algorithm to settle the following question: a bank account starts out with $10,000. interest is compounded monthly at 6
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!