1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna007 [38]
3 years ago
5

What are the two basic categories of film

Computers and Technology
1 answer:
kati45 [8]3 years ago
3 0
Video and Sound are the 2 most basic categories of film
You might be interested in
If two egg cells are fertilized what will happen?
Orlov [11]
Just try it and see what will happen
3 0
3 years ago
The Operating System is used to locate, move, and copy files.
Temka [501]

Answer:

Yes!! the operating system is used to locate, move, and copy file

7 0
3 years ago
Write code that inserts userItem into the output string stream itemsOSS until the user enters "Exit". Each item should be follow
My name is Ann [436]

Answer:

<h2>C++ Code:</h2>

#include <iostream>  //header file for input output functions like cout cin

#include <sstream>  // reads from string as a stream

#include <string> // header file for strings

using namespace std;   //  used for computer to detect  endl cout, cin

int main() {  //start of the main function of the program

string userItem;  // declare string type variable

ostringstream itemsOSS;   // output string stream    

cout << "Enter items (type Exit to quit):" << endl;  

// prompts user to enter items and type Exit to quit

cin >> userItem;   //reads input userItems

while (userItem != "Exit") {   //loop that runs untill userItem gets equal to Exit

itemsOSS << userItem << " ";

  // inserts userItem into the output string stream itemsOSS

cin >> userItem; }   //reads items stored in userItem variable

cout << itemsOSS.str() << endl;}   // prints current contents of the itemsOSS.                                                                                              

<h2>Explanation:</h2>

I will explain the code line by line.

  • The first line includes a header file iostream which is used for input and output functions such as cin, cout etc.
  • The next line includes sstream header file to read from a string as a stream. String streams are streams containing strings. Strings are treated like streams and stream operations are used on these strings.
  • The next line includes string header file in order to use strings in the program.
  • Next line namespace is used for the computer to identify objects like endl, cin, cout.
  • This lines starts the main function and enters the body of main function.
  • A string type variable userItem is declared.
  • ostringstream type variable itemsOSS is declared. ostringstream class works on strings.
  • This line prompts the user to enter the items and type Exit word to quit. endl is used to insert new line.
  • This line read input from variable userItem which is inserted by the user.
  • This statement starts a loop which will continue to execute until the user types Exit.
  • In the body of while loop, this line shows that the items entered by the user  in userItem will be inserted into the output string stream itemsOSS. Every userItem is followed by a space. << this is insertion operator. This retrieves items from the input sequence and inserts them into the itemsOSS, until Exit is typed.
  • Next line reads items stored in userItem variable.
  • str() returns a copy of the string which is manipulated by the current stream string and it outputs the contents of the itemsOSS stream.
<h2>Output:</h2>

Enter items (type Exit to quit):

red purple yellow Exit

red purple yellow

3 0
3 years ago
What is the name of the virus that appears to be a legitimate program but when opened
vivado [14]

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

6 0
3 years ago
HELP I SUCK IN THIS HELP!!!!! ​
Alona [7]

Answer:

I think it's print(5**3)

8 0
3 years ago
Other questions:
  • A ____ can interpret physical addressing information.
    11·1 answer
  • How can you best utilize CSS for Web Development?
    6·1 answer
  • If your bank is a member of the fdic, what does that mean for you?
    10·2 answers
  • What function would you use to find the mean in a Microsoft excel document ?
    6·2 answers
  • What set operator would you use if you wanted to see all of the Customers and the Employees including any records that may appea
    14·1 answer
  • A TCP Sender is just about to send a segment of size 100 bytes with sequence number 1234 and ack number 436 in the TCP header. W
    5·1 answer
  • If there is only a stop sign posted at a railroad
    9·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • Create a method called letterGrade that will pass the student's average grade as a parameter and return a letter grade (char). O
    12·1 answer
  • Write an algorithm (in pseudocode) for the following Scenario.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!