1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
2 years ago
7

In a C++ program, two slash marks ( // ) indicate:

Computers and Technology
1 answer:
Ganezh [65]2 years ago
5 0

Answer:

The option(B) is the correct answer .

Explanation:

In C++  the // (two slash marks ) indicating the beginning of a comment .The two slash marks ( // ) comment the single line in a program.To use two slash marks ( // ) comment we simply write  // in which line we have to make comment.

following are the example of code in c++

#include<iostream.h> // header file

void main() // main method

{

cout<< " india"; // print india

}

here // indicating the beginning of a comment .

You might be interested in
Why does my level up keyboard lights not working on my Hp chrome book when I try turning it on please help
xxTIMURxx [149]
Check to see if it’s plugged in all the way in if it’s not then unplug it and plug it back in
3 0
3 years ago
Read 2 more answers
Research the history of Internet in computers<br><br>​
solniwko [45]

Answer:

This allowed different kinds of computers on different networks to "talk" to each other. ARPANET and the Defense Data Network officially changed to the TCP/IP standard on January 1, 1983, hence the birth of the Internet. All networks could now be connected by a universal language.

3 0
2 years ago
(minimum 4 sentences) What is cyber security and why is it important
scoray [572]

Answer:

A cyber security that is used for people being rude and disrespectful online.A cyber security is also used so that none of your personal information gets out.It is important to have  cyber security because it keeps all your personal data safe.Cyber security is good to have if you have a job that has information about other people saved.

Explanation:

4 0
3 years ago
"Users in your office are complaining that they cannot connect to the servers" at a remote site. When troubleshooting, you find
Arisa [49]

Answer:

VLSM is missconfigured between the router interface and the DHCP Pool

Explanation:

Variable-Length Subnet Masking (VLSM) can also be called "subnetting subnets, an it implies that network engineers are given the opportunity to be able to produce various sizes of IP address by dividing the IP address space into hierarchical subnets with the aim of creating subnets with relatively distinct host counts that avoids using too many addresses. The benefits of VLSM are that it brings about a more efficient network addressing, and it also allows network engineers to do route summarization.

A router refers to networking device which enables the sending of data packets among computer networks. It is also used to send data packets from VLSM to DHCP pool.

he Dynamic Host Configuration Protocol (DHCP) Pool refers to a built-in server employed in networks by Virtual Controller to assign IP address to clients. A simultaneous access to many clients can be achieved by customizing the DHCP Pool as it can accommodate about 2048 addresses.  

Whenever there the VLSM is missconfigured between the router interface and the DHCP Pool, some users under a different router will not be to connect to the servers while users using another router will be able to connect.

5 0
2 years ago
What computing platform was designed to help a beginner create interactive objects that receive input from sensors and use that
iren [92.7K]

As i know,there is not any platform.Beacause when you control a device you need different computer codes (In order to adapt those environments,different devices have different environments) to drive the machine.If you are interested in this,i strongly suggest you to learn python .        >.<

3 0
3 years ago
Other questions:
  • What file formats can you safely use in a video presentation
    14·1 answer
  • A computer has a cache and main memory. 20 ns are required to reference a word that is in the cache. If the word is in main memo
    12·1 answer
  • Identify 3 ways mobile phone could be used to contact a bank apart from making a phone call to the bank
    12·1 answer
  • during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
    7·1 answer
  • A(n) __ is a list of main points and sub-points of a topic to include in a presentation
    14·2 answers
  • In this lab, you will create a programmer-defined class and then use it in a Java program. The program should create two Rectang
    14·1 answer
  • [5]Suppose a 1,600 kg car is traveling at 20.0 m/s. What average force is needed to stop the car in 4.0 s?
    8·2 answers
  • Answer the queston...........​
    7·2 answers
  • What is responsible for recording an image of an object with camera <br> Pls I neeed it right know
    8·1 answer
  • I want to start a debate about something
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!