1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
5

. Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name

Computers and Technology
1 answer:
prohojiy [21]3 years ago
3 0

Answer:

The program to this question can be given as follows:

Program:

//header file

#include <iostream> //defining header file  

using namespace std;  

//main

int main() //defining main method

{

   string name; //defining main method

   cout<<"enter name: "; //print message

   getline(cin,name); //using getline method

   cout<<"The name you inserted is: "<<name; //print value

   return 0;

}

Output:

Please Enter Name: Brenda Clinton

The name you inserted is: Brenda Clinton

Explanation:

Firstly the header file is included in the above C++ program code, in the next line the main method is defined, inside this method the string variable is defined which takes value from user-ends.

  • In the above specifies the getline method, which can be referred to as a standard library feature for reading an input stream string or a line. It removes characters from the input stream and applies this to the string object until the character is delimited.
  • After taking input the print method "cout" is used to print "name" variable value.

You might be interested in
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log
klemol [59]

Answer:

Install recommended updates.

Explanation:

To resolve this exploit the company has to install recommended updates. Since their encryption is prone or unsecured so to have better encryption or more secured encryption they have to install recommended updates.Since log files getting transferred over this channel so the company would not want to someone mess with their log files.

3 0
3 years ago
Which piece of code results in the following? Italics
andriy [413]
Italics

Italics

Italics

Italics


7 0
3 years ago
Type you all suck if you want to be my freind
Nina [5.8K]

Answer:

you all suck

Explanation:

;)

4 0
3 years ago
Read 2 more answers
What command would you use to view the path taken by an ethernet packet in windows?
Anni [7]
Hey there,
The answer is <span>tracert.

Hope this helps :))

~Top
</span>
5 0
3 years ago
As we discussed in class, with the explosion of huge volumes of unstructured data, a new breed of database technologies have eme
Ronch [10]

Answer:

Dynamo, Bigtable, and Cassandra are NoSQL data stores being used by some of the worlds biggest IT businesses such as Amazon.

These programs were developed to solve a specific or unique business problem. The initial plan was not to commercialize them.

 

Cheers!

5 0
3 years ago
Other questions:
  • A point is named by a lowercase letter. <br> a. True<br> b. False
    11·2 answers
  • What new information, strategies, or techniques have you learned that will increase your technology skills? Explain why its impo
    7·1 answer
  • Plugging in a cable is a good troubleshooting technique. <br> True or false
    5·1 answer
  • Sam needs to create a spreadsheet for his coworkers. They will need to follow a crossed a long road of data. Sam would like to m
    15·1 answer
  • A domestic air carrier airplane lands at an intermediate airport at 1815Z. The latest time it may depart without a specific auth
    9·1 answer
  • What feature should be used before a document is printed
    8·1 answer
  • This is your code.
    9·1 answer
  • How many discussion posts must you complete to meet the Expectations of the replies category
    11·1 answer
  • search engines use software that combs the web to find webpages and add new data about them to the database. what is this softwa
    5·1 answer
  • Which of the following protocols is used by an email client to retrieve messages from an email server, giving users the option t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!