1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nookie1986 [14]
3 years ago
11

write a c++ program that takes a string input from the user and removes all characters except numerals also display the number o

f numerals.
Computers and Technology
1 answer:
Xelga [282]3 years ago
5 0

Answer:

hi

Explanation:

You might be interested in
Who programmed the UNIVAC computer and literally "debugged" the first computer?
marysya [2.9K]

Grace Hopper is the first
7 0
3 years ago
Read 2 more answers
Do individuals have a privacy interest in their smartphones' locations?
Rzqust [24]

Answer:

In today's world, everyone using smartphones as it easily allow to communicate by using different types of features like texting, video, e-mail and by using internet we can run various types of applications.

Smartphones carries one of the main and important skills that is show our current location. By using various types of applications like Global positioning system (GPS), cell ID and wifi we can easily trace the location.

But there is different types of option according to the individual requirement as some people want privacy as they are not interested to share their location to anyone.

6 0
3 years ago
Briefly describe the role of creativity and innovation to entrepreneurship​
prisoha [69]

Answer:

isia

Explanation:

Apooopooopeeepepe

8 0
3 years ago
Between which zones and a DMZ should firewalls be placed? Choose two answers.
brilliants [131]

Answer:

Internal and External Zones

Explanation:

Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.

In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.

This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.

4 0
4 years ago
What are the three aspects to consider when taking and critiquing photograph?
svlad2 [7]
The angle
Steady Hands
Focusing on the right lighting
3 0
3 years ago
Other questions:
  • Which of the following statements is false?
    12·1 answer
  • Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If t
    8·1 answer
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • The Telecommunications Act of 1996 was a mixed bag for cable customers. Although cable companies argued that it would bring more
    8·1 answer
  • What is the relationship between interoperability and the other quality attributes highlighted in this book? For example, if two
    5·1 answer
  • Write a program name Dollars that calculates and displays the conversion of an entered number of dollars into currency denominat
    11·1 answer
  • Which of the following should you do if your accelerator is stuck? A. Pump your brakes to build fluid pressure. B. Shift to Neut
    14·2 answers
  • What does this mean??
    11·2 answers
  • Set screw compression and indenter are all types of
    13·2 answers
  • You use a Windows desktop system to edit and produce audio files. Your system has two hard disks installed. Your applications ar
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!