Answer:
D) It creates a vector object with a starting size of 10 and all elements are initialized with the value 2.
Explanation:
When you write the statement vector<int> v(10,2); This statement declares a vector or dynamic array of size 10 that is the first parameter and the second parameter is the value with which all the elements in the vector are to be initialized.So in this vector all the 10 values will be initialized with the value 2.It is one of the way of initializing the vector.
Yes I believe so
It should be acked up on the hard drive
Answer:
Audience knowledge level
Explanation:
The Key issue that Mario failed to consider when preparing for her presentation is known as Audience knowledge level.
Because Audience knowledge level comprises educating your audience with extensive information about the topic been presented. she actually tried in doing this but she was educating/presenting to the wrong audience ( People who are more knowledgeable than her on the topic ). she should have considered presenting a topic slightly different in order to motivate the audience.
Answer:
Following are the code to the given question:
#include <iostream>//header file
using namespace std;
int NumberOfPennies(int ND, int NP=0)//defining a method that accepts two parameters
{
return (ND*100 +NP);//use return keyword that fist multiply by 100 then add the value
}
int main() //main method
{
cout << NumberOfPennies(5,6) << endl; // Should print 506
cout << NumberOfPennies(4) << endl; // Should print 400
return 0;
}
Output:
506
400
Explanation:
In the method "NumberOfPennies" it accepts two parameters that are "ND and NP" that uses the return keyword that multiply 100 in ND variable and add in NP variable and return its values.
In the main method it it uses the cout method that call the by accepts value in parameter and print its value.
Answer:
Threat disgruntled employees
Explanation:
This is a type's threat in a network, why disgruntled employees is a threat?
Because disgruntled employees can implement a plant to damage a company's system when an IT employee be fired.
I t can be difficult to try to protect a system of these threats, Traditionally companies can wait for the less damage, then delete those credentials.
In cloud computing we have IDaaS, where an external company administers the company's credentials, is harder to damage the system in this way.