1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
6

In C++ Please :

Computers and Technology
1 answer:
Setler [38]3 years ago
4 0

Answer:

  1.    int birthMonth, birthYear;
  2.    
  3.    cin >> birthMonth;
  4.    cin >> birthYear;
  5.    
  6.    cout << birthMonth << "/" << birthYear;

Explanation:

Firstly, we declare two integer type variables, <em>birthMonth</em> and <em>birthYear </em>(Line 1).  Next, we use cin as the standard input stream to get the birth month and year from user (Line 3 - 4). Finally, we print the date using cout. We can chain the << operator to create a date string with format birthMonth/birthYear as expected by question (Line 6)

You might be interested in
_____________________ denotes the use of human interactions to gain any kind of desired access. Most often, this term involves e
pishuonlain [190]

Answer:

Social engineering

Explanation:

<u>Social engineering</u> involves exploiting existing relationships and <u>manipulating people to reveal certain confidential information or to grant access to such information, systems, or networks</u>, usually for fraudulent reasons.

4 0
2 years ago
Write a set of pseudocode instructions to feed a pet, using at least five steps?<br><br> Thank you!!
stira [4]
1.) Go get bag of pet food from cabinet

2.) Set the bag on counter

3.) Get pet food dish out of cabinet

4.) Open pet food bag, pour pet food into dish

5.) Close bag, give dish to pet.
4 0
3 years ago
Newt Corporation, headquartered in Los Angeles, is a nationwide provider of educational services to post-graduate students. Due
zysi [14]

Answer:

Option B i.e., Circuit level gateways only enable data to be inserted into a network which is the product of system requests within the network.

Explanation:

In the above question, some details are missing in the question that is options.

Option B is valid because Circuit level gateways are not the transmission inspection, always require information into such a server resulting through system appeal inside the server through maintaining a record for connections that are sent into the server and only enabling information in this is in answer to such queries.

Other options are incorrect because they are not true according to the following scenario.

5 0
3 years ago
How is a secure HTTP (HTTPS) different from a non-secured HTTP?
GuDViN [60]

Answer:

the second last option

Explanation:

secure HTTP is armed with passwords to ensure that only authorised users gain entry.

the data is encrypted during transmission

6 0
2 years ago
If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or
IRISSAK [1]

Answer:

B:6

Explanation:

FLVS :)

6 0
3 years ago
Other questions:
  • Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to
    7·1 answer
  • Brute force attacks involve identifying a valid user account and then bombarding the server with an extensive:
    13·1 answer
  • Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research
    11·1 answer
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    12·1 answer
  • When using a presentation software you can change the size of the text to...? Increase Font size, Decrease font size, increase t
    15·2 answers
  • Match the item to the type.
    11·1 answer
  • What effect on total current flow will a shorted series component have in a series-parallel circuit?
    8·1 answer
  • How does the use of blocking affect the external sorting algorithm, and how does it change the cost formula
    5·1 answer
  • Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!