1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
7

____ 59. Suppose that x and y are int variables, ch is a char variable, and the input is: 4 2 A 12 Choose the values of x, y, an

d ch after the following statement executes: cin >> x >> ch >> y; a. x = 4, ch = 2, y = 12 c. x = 4, ch = ' ', y = 2 b. x = 4, ch = A, y = 12 d. This statement results in input failure
Computers and Technology
2 answers:
Vlada [557]3 years ago
8 0

Answer:

d. This statement results in input failure.

Explanation:

We are taking input of 3 variables only and those are x,ch,and y. cin is a C++ keyword used take input entered by the user onto the screen cin is not a variable.

The input should of type int char int as written in the code. First is x and character variable ch and then the integer variable y and there should be only three inputs.

Gelneren [198K]3 years ago
5 0

Answer:

D

Explanation:

You might be interested in
Most email clients contain a ____ that allows the user to read an email message without actually opening it
Stolb23 [73]
Most email clients contain a "subject" that allows the user to read an email message without actually opening it.
4 0
3 years ago
Read 2 more answers
PowerPoint displays many that are varied and appealing and give you an excellent start at designing a presentation. However, you
Jet001 [13]

Answer:

The answer is themes.

Power point displays many <u>themes</u>

Explanation:

A power point theme is a combination of effects,fonts and colors that can be applied to the presentation.It makes the presentation more attractive and beautiful if used properly and smartly.Power point has built in themes that gives excellent start to your presentation.

5 0
3 years ago
The management of Ventura Inc. approves the purchase of a few computers for the sales team. The management wants only the most b
BaLLatris [955]

Answer:

Ventura Inc requires only System software's

Explanation:

The system software has three major functions which are:

1. File and disk management: this involve managing of files in the system, when user want to save, move, copy, delete and rename files, The system software will handle those task

2. Allocating system resources: The system resources such as time, memory, data input and output are  allocated by the system software. The main memory is managed by the system software to avoid conflict among various task.

3. Monitoring system activities:  The system security and system performance is also monitored by the system software.

The first two functionalities are the requirement of ventura inc  

8 0
3 years ago
Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi
kvasek [131]

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

3 0
3 years ago
Question 11. Assume that you want to copy and paste some range with values and number formats. Which radio button you should sel
Tcecarenko [31]

Answer:

i had the same qustion

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following are you likely to find between multiple school buildings in a city wide school district?
    9·1 answer
  • Create a view named product_summary. This view should return summary information about each product. Each row should include pro
    13·1 answer
  • Networking and telecommunications technologies, along with computer hardware, software, datamanagement technology, and the peopl
    11·1 answer
  • What is out put in a computer
    14·2 answers
  • What is considered appropriate dress for men and women in the workplace? Select all that apply.
    6·2 answers
  • Add my sna-p dkarpik58?...
    9·1 answer
  • Super Scores
    11·1 answer
  • What is the complete path and filename of the file where ports and their associated protocols are defined
    12·1 answer
  • Advantages and disadvantages of algorithm​
    5·1 answer
  • Suppose that you have the following definitions:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!