1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Triss [41]
3 years ago
7

Write a function named change() that has an integer parameter and six integers reference parameters named hundreds, fifties, twe

nties, tens, fives, and ones. The function is to consider the passed integer value as a dollar amount and convert the value into the fewest number of equivalent bills. Using the reference parameters, the function should alter the arguments in the calling function. Make sure your function is called from main() and returns a value to main() correctly. Have main() use a cout statement to display the returned value. Test the function by passing various data to it and verifying the returned value.

Computers and Technology
1 answer:
Dmitry_Shevchenko [17]3 years ago
8 0

Answer:

The code for this question is attached below:

You might be interested in
Which of the following SQL statements will display all customers who have not recently placed an order? a. SELECT customer# FROM
JulsSmile [24]

Answer:

The correct option is option 4 from the options indicated below:

Explanation:

The options are as given below

1-SELECT customer# FROM customers

UNION

SELECT customer# FROM orders;

2-SELECT customer# FROM orders

MINUS

SELECT customer# FROM customers;

3-SELECT customer# FROM orders

INTERSECT

SELECT customer# FROM customers;

4-SELECT customer# FROM customers

MINUS

SELECT customer# FROM orders;

Option 1 is not correct as it will provide the list of all the customers whether they have placed order or not.

Option 2 is not correct as it will provide the list of customers who have placed order but are not in the customers table. This will return the empty records.

Option 3 is not correct as it will provide the list of customers who have placed the order.

Option 4 is correct as it will provide the list of customers from the CUSTOMERS table which are not in the Orders table. thus the list of customers who have not placed the order yet.

3 0
3 years ago
Sarah is a detail-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
Talja [164]

Answer:

A. troubleshooting

Explanation:

Troubleshooting is the process of trying to detect problems with a software or hardware component so as to apply solutions to it.

Therefore, Sarah would need troubleshooting skills to help her test her program to detect all bugs and fix it.

3 0
3 years ago
4. Who developed the first design technology program which had a
HACTEHA [7]

Answer:

Macintosh.

Explanation:

Macintosh refers to a set of computers designed, developed and manufactured by Apple Inc. Apple officially began the sales of Macintosh on the 24th of January, 1984. The first designs of Macintosh are considered to be personal computers and had a mouse, in-built screen with a graphical user interface (GUI).

Macintosh developed the first design technology program which had a mouse and allowed for photo manipulation. This technology or software program used for photo manipulation is known as MacPaint, it was a raster graphics editor which was originally coded by Bill Atkinson using a Pascal programming language while its graphical user interface was designed by Susan Kare.

5 0
3 years ago
You cannot advance slides during the slide show by pressing the PAGE DOWN key
noname [10]
<span>You cannot advance slides during the slide show by pressing the PAGE DOWN key.
This is a true statement.
</span>
4 0
3 years ago
The main purpose of a honeypot is Select one:
masya89 [10]

Answer:

d. To help security professionals better understand and protect against threats to the system

Explanation:

The main purpose of a honeypot is to attract potential hackers and allow them to have access to a network system that is not the actual live network with close monitoring. This is done so as to learn and understand the intentions of the hacker and how they execute an attack. With this knowledge security professional are in a better position to deal with potential threats and keep the network secure.

4 0
3 years ago
Other questions:
  • Write three statements to print the first three elements of array runTimes. Follow each statement with a newline. Ex: If runTime
    12·1 answer
  • Help! live preview in brackets is not working
    8·1 answer
  • Megan has written the following rough draft for her assignment. Choose the correct way to complete each sentence. Sarah is creat
    13·1 answer
  • What is the printout of the call nPrint("a", 4)?
    14·1 answer
  • Using the media as equipment for living. Explain how you would use some form of media to serve a purpose in your life—and what t
    6·2 answers
  • Pressing the e key while in edit mode will exit the interaction mode<br><br> true<br><br> false
    7·1 answer
  • If you filmed a clip in 120fps, how many frames are in a seconds of video.
    13·1 answer
  • Within a major students can choose to study a specific area within major. For example a journalism student may study military jo
    8·1 answer
  • The working window of a presentation is the O outline O handout 0 notes o slide​
    5·2 answers
  • Site at least 3 articles of impact of internet that affect in our daily lives.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!