1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
4 years ago
5

. Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name

Computers and Technology
1 answer:
prohojiy [21]4 years ago
3 0

Answer:

The program to this question can be given as follows:

Program:

//header file

#include <iostream> //defining header file  

using namespace std;  

//main

int main() //defining main method

{

   string name; //defining main method

   cout<<"enter name: "; //print message

   getline(cin,name); //using getline method

   cout<<"The name you inserted is: "<<name; //print value

   return 0;

}

Output:

Please Enter Name: Brenda Clinton

The name you inserted is: Brenda Clinton

Explanation:

Firstly the header file is included in the above C++ program code, in the next line the main method is defined, inside this method the string variable is defined which takes value from user-ends.

  • In the above specifies the getline method, which can be referred to as a standard library feature for reading an input stream string or a line. It removes characters from the input stream and applies this to the string object until the character is delimited.
  • After taking input the print method "cout" is used to print "name" variable value.

You might be interested in
Most software packages have functions for generating _____ about columns of data, which include statistical summaries like contr
GrogVix [38]

Answer:

Descriptives is the correct answer of this question.

Explanation:

Some software packages provide data column definitions that include qualitative summaries such as control averages, mean, average, minimum, standard deviation, number of zero values, number of empty records, etc.

  • A  descriptives summary is a sentence that gives someone information or something.
  • Description is the style of narration creation aimed at making a location, an event, a character or a community vivid.

There are 2 types of Descriptives :-

  1. Narrative type.
  2. Argumentative type.

3 0
3 years ago
Kendall receives an email stating that a leading computer company is giving away free computers, asking her to forward the email
gavmur [86]

Explanation:

Kendall should report the email as scam and delete email instead of forwarding it. She should also run her virus protection software as these kind of emails on the Internet are mostly Fraud and can contain virus so the user should avoid them.

8 0
3 years ago
Define each of the following data mining functionalities: characterization, discrimination, association and correlation analysis
Step2247 [10]

Answer:

In the clarification portion below, the definition according to the received information is summarized.

Explanation:

  • <u>Characterization:</u>

It is indeed a summary of general object characteristics in something like a target class and creates characteristic laws.

  • <u>Discrimination:</u>

Just before predefined data types have been held to a different standard from everyone else, it's indeed bias which always happens.

  • <u>Association:</u>

It's a mechanism that determines the possibility that objects in a set will co-occur.

  • <u>Classification:</u>

It is indeed duction which attributes elements to target groups or classes in a set.

  • <u>Prediction:</u>

It is solely dependent on either the interpretation of other similar values to classify data points.

  • <u>Clustering:</u>

It has been used to position the components of the information through their corresponding classes.

  • <u>Evolution Analysis:</u>

It would be for objects whose behavior varies throughout time to explain or design regularities.

5 0
3 years ago
A(n) __________ can include a computer's full operating system, applications, and system settings, including security and config
babymother [125]

Solution:

It is done by Operating system.

An Operating system is system software that manages computer hardware and software resources and provides common services for computer programs.

Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources.

For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and supercomputers.


5 0
3 years ago
Please code in python and add comments to code
Gnoma [55]

#accepting input from user

n=int(input("Enter a number: "))

#entered number is stored in a temporary variable

temp=n

#initializng required variables

rev=0

dgt=0

#digits are reversed inside while loop

while(n>0):

dgt=n%10

rev=rev*10+dgt

n=n//10

#original number and its reverse are compared

if(temp==rev):

#if equal, it's a palindrome

print("It is a Palindrome")

else:

#if not equal, it's not a palindrome

print("It is not a Palindrome")

#◌⑅⃝●♡⋆♡Nåmřāthā♡⋆♡●⑅◌

4 0
2 years ago
Other questions:
  • There are N bulbs numbered from 1 to N, arranged in a row. The first bulb is plugged into the power socket and each successive b
    6·1 answer
  • WHAT IS SQL AND HOW CAN YOU MEET THE DATA REQUIREMENTS ALSO MAINTAINING DATA INTEGRITY,AND LASTLY STATE THE FULL MEANING OF SQL
    11·1 answer
  • The specifications for ____ are developed by the world wide web consortium (w3c) and are continually evolving.
    13·1 answer
  • If an attacker decides to implement a less obvious port-scan, or stealth attack, which of the following techniques would be appr
    14·1 answer
  • Written Hawaiian also has fairly simple spelling rules for determining if a word is a valid word in the language (even if the me
    9·1 answer
  • Aubrey uses the following formula to calculate a required value. Which elements of the formula use mixed cell referencing?
    13·2 answers
  • Write a program with a function that accepts a string as an argument and returns the number of uppercase, lowercase, vowel, cons
    14·1 answer
  • What makes a source credible?
    9·2 answers
  • What do you think that private information like passwords pin number will be guarded or shared with the public? why?
    12·1 answer
  • HELP ME PLEASE 41 PTS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!