Answer:
dataFile << salary;
Explanation:
To write salary to a file (payroll.dat) using ofstream, you make use of the following instruction:
<em>ofstream dataFile;
</em>
<em>myfile.open ("payroll.dat");
</em>
<em>myfile <<salary;
</em>
<em>myfile.close();</em>
<em />
This line creates an instance of ofstream
<em>ofstream dataFile;
</em>
This line opens the file payroll.dat
<em>myfile.open ("payroll.dat");
</em>
This is where the exact instruction in the question is done. This writes the value of salary to payroll.dat
<em>myfile <<salary;
</em>
This closes the opened file
<em>myfile.close();</em>
<em />
<em />
Answer:
a. 2^6, or 64 opcodes.
b. 2^5, or 32 registers.
c. 2^16, or 0 to 65536.
d. -32768 to 32768.
Explanation:
a. Following that the opcode is 6 bits, it is generally known that the maximum number of opcodes should be 2^6, or 64 opcodes.
b. Now, since the size of the register field is 5 bits, we know that 2^5 registers can be accessed, or 32 registers.
c. Unsigned immediate operand applies to the plus/minus sign of the number. Since unsigned numbers are always positive, the range is from 0 to 2^16, or 0 to 65536.
d. Considering that the signed operands can be negative, they need a 16'th bit for the sign and 15 bits for the number. This means there are 2 * (2^15) numbers, or 2^16. However, the numbers range from -32768 to 32768.
Answer:
d
Explanation:
salak sensin kolay gelsin
Selecting the button assigned
Using the shortcut Keys assigned
Explanation:
By clicking the assigned button one can run a macro and we can assign a short cut key to macro which we created.
So, the two options we can use to run a macro.
Answer: Source
Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.
The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .
The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.