1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
11

write a c++ program that takes a string input from the user and removes all characters except numerals also display the number o

f numerals.
Computers and Technology
1 answer:
Xelga [282]3 years ago
5 0

Answer:

hi

Explanation:

You might be interested in
100 POINTS!!!!!!!
bogdanovich [222]

A)

<u>~</u><u>Intellectual property needs to be protected because it usually has</u><u> </u><u>psychological</u><u> </u><u>value.</u>

Hope this helped you- have a good day bro cya)

4 0
3 years ago
Read 2 more answers
Linda and her mom want to start a company selling homemade brownies to large supermarket chains. To get started, they have creat
lianna [129]

Answer:

Peer to Peer Network

Explanation:

In a peer to peer network, the 'peers' are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a peer to peer network becomes a file server as well as a client.

The only requirements for a computer to join a peer-to-peer network are an Internet connection and a peer to peer software.

4 0
3 years ago
Which of the following is true regarding data acquisition? Because data acquisition is often technical, the research team does n
elixir [45]

Answer:

Data acquisition should follow a detailed collection plan that is set in advance.

Explanation:

The process of collection of data over computer with the help of electronic sensors is called data acquisition. The can be related to voltage, current, temperature etc.

For example

Data collection with the help of sensors to monitor weather conditions is an example of data acquisition. In this process data has been gathered on already planned format. Each column or row of data will be helpful to predict the weather condition such as, rain predictions, earthquake prediction etc.

That's why to collect this type of data, collection plan should be set in advance to gather relevant information with the help of data.

4 0
4 years ago
Read 2 more answers
Why is it necessary to understand conflict of interest and how it could affect you at work​
Anastasy [175]

Answer:

Conflict of interest is a common issue in the workplace. Most of us have heard someone say, “It’s who you know, not what you know.” We have heard co-workers complain that a manager’s relative always gets the biggest raise or the best assignment. We might have seen colleagues accept gifts from potential vendors. Maybe a co-worker leaves work 20 minutes early every day so she can get to her second job. A supervisor may give a co-worker time off from work to do volunteer work or might allow employees to solicit donations and funds in the workplace, whether for the Girl Scouts or a local school function. Even though these situations are very different, they all fall under the heading of “conflict of interest.”

Explanation:are a clash that most often occurs between requirements and interests. Various types of conflicts of interest can occur because of the nature of relationships versus rules of organizations or federal and state laws. People can easily become biased (have an unfair preference) because of small things like friendship, food, or flattery, or they may be influenced to make a decision because of the potential to gain power, prestige, or money. Conflicts can occur when an individual makes or influences a decision and does so for some personal gain that may be unfair, unethical, or even illegal. The important part is what you do in each of those situations. Do you allow your family, friendship, financial, or inside knowledge affect your actions? If you do, you could be violating state statute and university policy.

In our work lives, we also have interests that could influence the way we do our jobs and the decisions we make. Even if we never act on them, there may be an appearance that a conflict of interest has influenced our decisions. Consider this example. Your supervisor is promoted to department director. His daughter-in-law is hired as a new supervisor within the college but is not reporting to him. Maybe the new supervisor is the best candidate for that position, and maybe the new department director had nothing to do with her hire. Even if this hire met all of the requirements under our Employment of Relatives policy, the situation appears suspicious and employees may think that something was unfair or unethical about her hire.

Transparency (being completely open and frank) becomes important when dealing with both actual and potentially perceived conflicts of interest. Perception happens when an individual observes something (behavior or activity) and comes to a conclusion. Perceiving a conflict of interest does not make it a conflict of interest. The true test of verifying whether a matter is just a potentially perceived conflict of interest, or an actual conflict of interest, is disclosure.

7 0
4 years ago
How many fixes are available for Adobe Photoshop CS4 (64 Bit)?
arsen [322]

Answer:

There are three (3) fixes in adobe cs4.

Explanation:

Adobe photoshop cs4 is a version of the creative cloud's professional graphic applications used to edit pictures, design interfaces, make graphical illustrations, draw and animate the drawings, etc.

It can be installed in several computer operating system platforms like linux, mac and windows. The adobe photoshop cs4 doesn't support the windows installation and might run into several issues. There are other issues in other supported platforms, but unlike for windows, there are three fixes for these problems.

4 0
3 years ago
Other questions:
  • Do clocks have cell's?
    15·2 answers
  • The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t
    11·1 answer
  • Critics of media consumption
    10·2 answers
  • An attacker is intent on disturbing the communication by inserting bogus packets into the communications.
    9·1 answer
  • What a true portrait reveal
    7·1 answer
  • Suppose that a program asks a user to enter multiple integers, either positive or negative, to do some calculation. The data ent
    13·1 answer
  • How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either
    7·1 answer
  • Which of the following is a true statement about parameters in data management? Check all that apply.
    11·1 answer
  • WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
    5·1 answer
  • Write a short note on Ms - Excel...​..
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!