1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
3 years ago
11

C++

Computers and Technology
1 answer:
Luden [163]3 years ago
7 0

Answer:

The program to this question as follows:

Program:

//header file iostream

#include<iostream> //including file for use basic function

//using name space

using namespace std;

//main method

int main() //defining main method

{

   int a[3][3]; //defining two dimension array

   int x,y,sum=0; //defining variables

   cout<<"Enter array elements: "<<endl; //message

   for(x=0;x<3;x++) // for row

   {

       for(y=0;y<3;y++) //for column

       {

          cin>>a[x][y]; //input values from user.

       }

       

   }

   //loop for calculting sum.

   for(x=0;x<3;x++)

   {

       for(y=0;y<3;y++)

       {

       sum=sum+a[x][y];//add all elements

       }

       

   }

   cout<<"Sum: "<<sum; //print sum.

   return 0;

}

Output:

Enter array elements:  

1

2

3

4

5

6

7

8

9

Sum: 45

Explanation:

In the above C++ programming language code first, a header file is included then the main method is declared, inside a main method 2D array that is "a[][]", and an integer variable is defined that are "i, j, and sum". In the next line for loop is used, this loop is used two times that can be described as follows:

  • The first time it is used for inserting elements from user ends.  
  • The second time, it uses the sum variable to add all array elements. and in the last print function that is "cout" is used for print sum variable value.
You might be interested in
Jason had clicked an image of his favorite band at a concert. He wanted to create a washed out look of this image to turn it int
8_murik_8 [283]

just to ensure people, its desaturate (kinda like saturation)

4 0
4 years ago
A search engine that crawls uses
RoseWind [281]

Answer:

web crawlers or spider software

Explanation:

A search engine that crawls uses the web crawler or the spider software. And it also uses the server side JavaScript based crawlers and programming languages like Python and PHP. The search engine finds the content category through the meta keywords and directs the page to the index. The index contains details of similar types of pages, And each page has one category, and if category is not found which is rarest, a new category is being created.

7 0
4 years ago
Any of my friends can you answer me plz?
Valentin [98]

Answer:

God is always your friend mate

Explanation:

5 0
3 years ago
Describe what metadata are and what value they provide to the database system.
postnew [5]
Metadata is data about data.

For example, a mp3 file is data, metadata would be data explaining the artist, song name, album, etc.

In a database, the data would be a record, metadata about this could include if the data was an integer or a string, as well as the size limit for this field.
4 0
4 years ago
Which of the following are disadvantages of networks? Check all of the boxes that apply.
RideAnS [48]

Answer:

• Network intruders can access all computers on a network.

• Networks are costly to set up.

Explanation:

A network can be defined as a connection between the internet and the computer. A network is a means by which information or data are transmitted from one computer to another.

We have various types of networks and some of them are:

a) Local Area Network (LAN)

b) Wireless Local Area Network (WLAN)

c) Wide Area Network (WAN)

d) Campus Area Network (CAN)

e) Metropolitan Area Network (MAN)

f) Personal Area Network (PAN) e.t.c

The disadvantages of network are:

a) Network intruders such as computer hackers can easily access all computers on a network.

b) Networks are costly to set up.

It is of outermost importance that a network used by a computer is secured using security such as encryption in other to prevent data loss , hackers and exposure of information that are sensitive to computer users.

4 0
3 years ago
Other questions:
  • When creating a query using the query design command, first you must ____?
    13·1 answer
  • Suppose that the code below is the body of some loop. Given variables x and y write some code that reads a value into the variab
    5·1 answer
  • If an Administrator performs a clean install of Windows Server 2012 R2 on a new server, and then moves critical domain services
    9·1 answer
  • a. Create an Abstract class called Vehicle with abstract methods accelerate, stop, and gas, &amp; data of your choice (5 marks)
    12·1 answer
  • Why might the government censor what its citizens see on the internet?
    13·2 answers
  • What is the output?
    6·2 answers
  • Need help fast this is do a 4
    5·1 answer
  • For this exercise, you are going to write your code in the FormFill class instead of the main method. The code is the same as if
    10·1 answer
  • Which is the best reason for why it is important to be careful about entering personal information online?
    10·2 answers
  • What is text or pictures behind the document called?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!