1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
6

Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array.

(Assume the line may contain whitespace characters and the total number of the characters in the line is less than 50)
Computers and Technology
1 answer:
SashulF [63]3 years ago
8 0

Answer:

Following are the statement in the C++ Programming Language.

//set character data type variable

char line[50];

//get character input from the user

cin.get(line, 50);

Explanation:

<u>Following are the description of the statement</u>.

  • In the above statement, we set character data type array variable that is 'line' and its index value is '50' that means the following variable not contain more than 50 character elements.
  • In the other line, we get character type input in the following variable 'line' from the user through the get() method.
You might be interested in
How many binary digits are in 10^100.
Basile [38]

Answer:

333 binary digits.

Explanation:

8 0
2 years ago
Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server
adelina 88 [10]

Answer: C. Differential backup

Explanation: There are several ways od ensuring the preservation and storage of data even cases of disaster, one of such ways is data data mirroring which allows data to be replicated or copied in real time and several backup options. In cases where there there is need to restore a server, the warm recovery site provides a data or disaster recovery option used to mitigate the effect of data loss on organization. In the absence of data mirroring, differential backup option, provides the quickest recovery option as it only requires changes in the data stored after the last full backup. These speed experieced should be expected due to the relatively low data been dealt with rather than the entire data.

5 0
3 years ago
Task manager is showing an application as “not responding.” what can you do?
34kurt
I think it's b because "end application" would make the most sence
8 0
4 years ago
___ is the most important variable that is measured and controlled in a commercial hvac system.
Pavel [41]

The parameter being monitored and controlled is the controlled variable. The dry-bulb temperature of the air leaving the cooling coil is the controllable variable in this particular instance. The sensor assesses the state of the controlled variable and provides the controller with an input signal.

<h3>What is a HVAC ?</h3>

The employment of various technologies for heating, ventilation, and air conditioning is done to regulate the temperature, humidity, and cleanliness of the air in a closed environment. Its objective is to provide adequate indoor air quality and thermal comfort.

  • To cool or heat a building, the main unit of a ducted system forces air via a network of air ducts. On the other hand, ductless systems don't have air ducts and employ different techniques to spread cleaned air across a room.

Learn more about HVAC system here:

brainly.com/question/20264838

#SPJ4

6 0
2 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • Victor has been murdered, and Art, Bob, and Carl are suspects. Art says he did not do it. He says that Bob was the victim's frie
    14·1 answer
  • the UDP server described needed only one socket, whereas the TCP server needed two sockets. Why? If the TCP server were to suppo
    8·2 answers
  • How do you find the exterior angle measure of any regular polygon? (The degree in which to turn the turtle to draw a shape)
    10·1 answer
  • How do i end my current plan that i never signed up for, the basic one it charged me $24
    11·2 answers
  • Achieves integration through several different types of software that sit between and provide connectivity for two or more softw
    11·1 answer
  • 2. Write a Python regular expression to replace all white space with # in given string “Python is very simple programming langua
    14·1 answer
  • List an example of application software used in spreadsheet​
    11·2 answers
  • Which is an example of an operating system? (5 points)
    5·1 answer
  • Cheng, a student, is researching a company's profile on a professional networking website. In what way will this kind of researc
    13·1 answer
  • What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!