1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
6

Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array.

(Assume the line may contain whitespace characters and the total number of the characters in the line is less than 50)
Computers and Technology
1 answer:
SashulF [63]3 years ago
8 0

Answer:

Following are the statement in the C++ Programming Language.

//set character data type variable

char line[50];

//get character input from the user

cin.get(line, 50);

Explanation:

<u>Following are the description of the statement</u>.

  • In the above statement, we set character data type array variable that is 'line' and its index value is '50' that means the following variable not contain more than 50 character elements.
  • In the other line, we get character type input in the following variable 'line' from the user through the get() method.
You might be interested in
What type of waves in the electromagnetic spectrum has the Search for Extraterrestrial Intelligence (SETI) mostly analyzed in th
charle [14.2K]
I would say A because the SETI Institute said, "Philip Morrison and Guiseppe Cocconi analyzed how two civilizations separated by many light years of space might use electromagnetic radiation to communicate.

Electromagnetic radiation is the general term for the more familiar light and radio waves."

So there you go!

3 0
3 years ago
An electronic spreadsheet is a type of<br> archive.<br> database.<br> document.<br> periodical.
zhenek [66]

Answer:

The answer is "database"

Explanation:

The spreadsheet is an application program, that is used to organized, analysis, and store data in tabular format. It is also used to import data and provide a database in programming that is used to store data and other option is not correct that can be described as follows:

  • Archive uses VBA that stands for "Visual Basic for Applications", it is used to store data in an archive file, that's why it is not correct.
  • Document is a file that is used to store data, that's why it is not correct.
  • Periodical use graph and bar charts to display data graphically, that's why it is not correct.

7 0
3 years ago
Read 2 more answers
Sarah maintains a blog about her soap-making business, and she has hired someone to create a database for this business. She mak
ivann1987 [24]
The database planner would most likely create a table that contains customer contact information since these would be the individuals who placed an order for Sarah's products after visiting her blog. 
4 0
3 years ago
Use python
Degger [83]

Answer:

def rec_dig_sum( num ):

   num_list = [ digit for digit in str(num)]

   total = 0

   for x in num_list:

       total += x

   return total

def dict_of_rec_dig_sums(low, high):

   mydict = dict()

   for number in the range(low, high+1):

      mydict[rec_dig_sum(number)] = number

   return mydict

Explanation:

The python program defines two functions, "rec_dig_sum" and "dict_of_rec_dig_sums". The former accepts a number and returns the sum of the digits of the number while the latter accepts a low and high number range.

The program returns a dictionary with the recursive sum as the keys and the number count as the values.

3 0
3 years ago
How should you respond to the theft of your identity cyber awareness.
antiseptic1488 [7]

The way to respond to the theft of your identity cyber awareness is; To report the crime to the local commission which is the Federal Trade Commission (FTC).

<h3>Protection from Identity Theft</h3>

Identity Theft is basically a crime that happens happens when someone steals your personal information and uses it commit a fraudulent offence.

Now, the person that stole your identity may use the stolen information he got from you to apply for credit, file taxes, medical services or other government privileges.

The acts perpetuated above by the thief could lead to damage to your reputation with credit status and your good name too which could take years to rebuild.

Thus, it is very pertinent to report any case of such to the relevant government commission which in this case is Federal Trade Commission (FTC).

Read more about Identity Theft at; brainly.com/question/15252417

5 0
3 years ago
Other questions:
  • Expressing your needs to others is aggressive behavior.<br> True or False?
    5·2 answers
  • Lenovo's ThinkPad laptop computers is designed in the United States, the case, keyboard, and hard drive are made in Thailand; th
    14·1 answer
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • It is a SQL keyword that creates an autoincrementing field.
    5·1 answer
  • JPG is considered a lossy file format. What does this mean?
    15·2 answers
  • 31
    10·1 answer
  • What is an example of a recent development in technology
    11·2 answers
  • How does social network use message to entertain?
    14·1 answer
  • How to use 2 tabs at once on my Lenovo yoga book?​
    9·1 answer
  • Explain ,how the computer network reduces cost of operation? (don't copy from any website)​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!