1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mnenie [13.5K]
3 years ago
6

Given the function definition void something ( int a, int& b ) { int c; c = a + 2; a = a* 3; b = c + a; } what is the output

of the following code fragment that invokes something? (All variables are of type int.) r = 1; s = 2; t = 3; something(t, s); cout << r << ' ' << s << ' ' << t << endl;
Computers and Technology
1 answer:
timurjin [86]3 years ago
8 0

Answer:

1 14 3

Explanation:

If that code fragment is put under a main() function and then it will yield the above output. According to the function something(), only changes in value second parameter will be reflected and first will be unchanged because second is passed by reference and the first one is passed as value so only address of 's' is passed, so, only its value is changed and the rest are same.

You might be interested in
SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without es
Mashutka [201]

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

8 0
3 years ago
What is a programming method that provides for interactive modules to a website?
Veseljchak [2.6K]

Answer:

Java?

Explanation:

8 0
3 years ago
In the Database sheet, enter conditions in the criteria range for unoccupied two- and three-bedroom apartments that need to be r
kari74 [83]

Answer:

See attachment fir procedures to get answers.

Explanation:

Given that;

In the Database sheet, enter conditions in the criteria range for unoccupied two- and three-bedroom apartments that need to be remodeled. Enter criteria as text only, without use of quotation marks. Be sure to enter the criteria separately in rows 3 and 4.

See attachment

3 0
3 years ago
What is the best way to limit a google search and get the most specific information possible?
Marrrta [24]
You go into settings on the google search and click advanced search. The rest you do on your own.
6 0
3 years ago
Write calls to printf to display the variable x in the following formats:
lys-0071 [83]

Answer:

a) printf("%-5.3e",x);

b) printf("%10llu",x);

<h3>Explanation:</h3>

We can assign any value to x at the start of program:

For Example:

float x = 72.149;

Then in order to print exponential notation, left justified, in field size of 5 with 3 digits after the decimal point, we need to use the following format:

printf("%-5.3e",x);

where e represent exponential notation.

5 represents field size of 5 and 3 represents digits after decimal point.

In order to print x as right justified, in a 11 digit field, we need to use the following format:

printf("%10llu",x);

8 0
2 years ago
Other questions:
  • Create a division formula.
    9·1 answer
  • The second row of letters on the keyboard is called the______ row
    14·2 answers
  • Use the Internet and other sources to research the two disadvantages of standard biometrics: cost and error rates. Select one st
    10·1 answer
  • A general rule for adding text to a slide is ____.
    8·2 answers
  • What is the purpose of an internet protocol address (ip address)? it specifies whether a computer is using a broadband network o
    10·1 answer
  • What is the code name for the 12 engineers who developed the ibm pc?
    8·1 answer
  • So I was looking at my profile and it says i'm a brainly PLUS member didn't sign up for it tho. Any ideas why this could have ha
    14·2 answers
  • Search..
    14·1 answer
  • The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select
    10·1 answer
  • Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C string
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!