1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
13

Assume that name has been declared suitably for storing names (like "Amy" , "Fritz" and "Moustafa") Write some code that reads a

value into name then prints the message "Greetings, NAME! ! !" where NAME is replaced the value that was read into name. For example, if your code read in "Hassan" it would print out "Greetings, Hassan! ! !".
Computers and Technology
1 answer:
taurus [48]3 years ago
6 0

Answer:

cin >> name;

cout << "Greetings, " << name << "!!!" << '\n';

Explanation:

You might be interested in
Which of these sites would need additional investigation to check for reliability?
irga5000 [103]
Could you please give add some detail? I would assume any site ending in .com would need to be checked for reliability due to the fact anyone can have a .com, but a site such as edu is more trustworthy. 

5 0
4 years ago
Read 2 more answers
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role shou
olga2289 [7]

Answer:

assignee

Explanation:

5 0
3 years ago
Which statement best explains the way that similar apps are used in different devices?
monitta

The statement that  best explains the way that similar applications are used in different devices is option b:  Although the systems are different, the apps are still designed to work the same way.

<h3>How does an app work?</h3>

An app is known to be a kind of a software that gives room for a person to be able to carry out some specific tasks.

Note that Applications for desktop or laptop computers are said to be called desktop applications and those apps that are used in mobile devices are known to be called mobile apps.

Hence, The statement that  best explains the way that similar apps are used in different devices is option b:  Although the systems are different, the apps are still designed to work the same way.

Learn more about Software applications from

brainly.com/question/22442533

#SPJ1

6 0
2 years ago
Write a code segment that displays the values of the integers x, y, and z on a single line, such that each value is right-justif
Elena L [17]

Answer:

x = int(input ("enter first number: "))

y = int(input ("enter second number: "))

z = int(input ("enter third number: "))

print('%6d %6d %6d' %(x,y,z))

Explanation:

Using python programming language we receive three integers variables (x,y,z) then using string formatting (%6) which specifies that the output should be right justified with a width of 6, the values are printed out.

3 0
3 years ago
How many passes will it take to find the five in this list?
Savatey [412]

Answer:

1 im prety sure

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Businesses have taken advantage of many of the smart phone features to promote their business. TRUE OR FALSE
    5·2 answers
  • A user reports that she can't access the new server used in the accounting department. you check the problem and find out that h
    9·1 answer
  • Write a MARIE program to allow the user to input 8 integers (positive, negative, or zero) and then find the smallest and the lar
    15·1 answer
  • Reasons for the growth of decision-making systems include:
    13·1 answer
  • Solve the recurrence relation.<br> S(1)=1<br> S(n)= S(n-1)+(2n-1) for n&gt;=2
    13·1 answer
  • What is data analysing data and give three examples ?​
    9·1 answer
  • which scheduling algorithm allocate the CPU firt to the process that request the CPU first, (a) first come first serve,(b) short
    9·1 answer
  • Risk taker positive or negative​
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • a cloud access security broker (casb) provides protection across 4 areas/pillars: visibility to detect all cloud services, data
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!