1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anarel [89]
3 years ago
13

An array of String objects, words, has been properly declared and initialized. Each element of words contains a String consistin

g of lowercase letters (a–z). Write a code segment that uses an enhanced for loop to print all elements of words that end with "ing".
As an example, if words contains {"ten", "fading", "post", "card", "thunder", "hinge", "trailing", "batting"}, then the following output should be produced by the code segment.
fading trailing batting
Write the code segment as described above. The code segment must use an enhanced for loop.
Computers and Technology
1 answer:
finlep [7]3 years ago
4 0

Answer:

Explanation:

#include <iostream>

using namespace std;

int main()

{

   string cwords[8]={"ten", "fading", "post", "card", "thunder", "hinge", "trailing", "batting"};

   string temp="";

   for (int i=0; i<8; i++)

   {

       temp=cwords[i];

       int j=temp.length();

       if (temp[j-3]=='i' && temp[j-2]=='n' && temp[j-1]=='g')

       {

           cout<<temp<<endl;

       }

   }

   return 0;

}

You might be interested in
__________ is a Microsoft software development tool that developers can use to write multimedia applications
ohaa [14]

answer:

DirectX.    

hopefully this is helpful.

6 0
2 years ago
What are the different types of application architecture
ivann1987 [24]

Answer: There are many different types of application architectures, but the most prominent today, based on the relationships between the services are: monoliths and N-tier architecture, microservices, and event-driven architecture and service-oriented architecture.

Explanation: A layered or N-tier architecture is a traditional architecture often used to build on-premise and enterprise apps, and is frequently associated with legacy apps.

A monolith, another architecture type associated with legacy systems, is a single application stack that contains all functionality within that 1 application. This is tightly coupled, both in the interaction between the services and how they are developed and delivered.

Microservices are both an architecture and an approach to writing software. With microservices, apps are broken down into their smallest components, independent from each other. Each of these components, or processes, is a microservice.

With an event-driven system, the capture, communication, processing, and persistence of events are the core structure of the solution. This differs from a traditional request-driven model.

The service-oriented architecture (SOA) is a well-established style of software design, that is similar to the microservices architecture style.

3 0
3 years ago
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a tr
ki77a [65]

Answer:

SSD

Explanation:

8 0
2 years ago
An independent penetration testing company is invited to test a company's legacy banking application developed for Android phone
LenaWriter [7]

In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

<h3>Should a person use certificate pinning?</h3>

Mobile applications are known to be one that often make use of   certificate or also public key pinning so that they can be able to make sure that communications are secure.

Hence it is one that  is often implemented if  the developer of the application is said to be require to validate the remote host's identity or if operating in a harsh environment.

Hence, Certificate pinning hinders which certificates are considered valid for a any kind of website,  and as such, In the case above, the company can prevent this from happening in the public Internet through the Use certificate pinning.

Learn more about certificate from

brainly.com/question/1874937

#SPJ1

4 0
1 year ago
A cell reference is also called a cell _______.
viva [34]
A cell reference is also called a cell address.
7 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • Airbags only absorb the _____ impact in a crash. initial final mid-stage smallest
    13·1 answer
  • In three to five sentences, explain how you would insert graphics using your word-processing software.
    7·2 answers
  • Who is the last person appointed to the u.s supreme court
    11·1 answer
  • Joshua takes ownership of all his tasks. Which quality is he demonstrating?
    9·2 answers
  • ___ is a family of data formats that helps people automatically receive feeds anytime there are new postings to their favorite b
    14·1 answer
  • ARP request is send to
    12·1 answer
  • Match the item to the type.
    11·1 answer
  • when you sent email your email can be set to automatically keep a copy where do you find these copies​
    13·1 answer
  • I know I'm asking for a lot. But this is my last question. If we do it I pass my semester. help please.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!