1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sphinxa [80]
3 years ago
15

Consider the following program segment. ifstream inFile; //Line 1 int x, y; //Line 2 ... //Line 3 inFile >> x >> y;

//Line 4 Which of the following statements at Line 3 can be used to open the file progdata.dat and input data from this file into x and y at Line 4?
Computers and Technology
1 answer:
MrMuchimi3 years ago
6 0

Answer:

inFile.open("progdata.dat");

Explanation:

This command opens the file which is passed to it as an argument. We are quite used to the C++'s cin and cout functions contained in iostream library for reading and writing data, however, when working will real-life stuff, we find ourselves working with huge data saved as separate files and require our programs to read them, manipulate them and possibly write back to the files... The first operation usually carried out before a file can be read or written to is open

You might be interested in
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are calle
yuradex [85]

Blaster Worm., the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely. A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive.

4 0
2 years ago
To steal credit card information by installing devices on card readers located in ATMs, gas pumps, restaurants, grocery stores,
riadik2000 [5.3K]

Answer:

Skimming

Explanation:

7 0
3 years ago
Read 2 more answers
In a(n) _____, the web becomes an integral part of the application, rather than just a communication channel, and systems analys
IRISSAK [1]

In an <u>Internet-based system</u>, the web becomes an integral part of the application, rather than just a communication channel, and systems analysts need new application development tools and solutions to handle the new systems.

d) Internet-based system

<u>Explanation:</u>

Web information system, or web-based information system, is a data framework that utilizes Internet web advancements to convey data and administrations, to clients or other data frameworks/applications.

It is a product framework whose primary intention is to distribute and keep up information by utilizing hypertext-based standards. In an Internet-based system, the Web turns into a fundamental piece of the application, instead of only a correspondence channel, and frameworks investigators need new application advancement instruments and solutions to handle the new systems.

7 0
2 years ago
List out 20 output devices ​
GaryK [48]

Answer:

20 Examples Output Devices

Monitor.

Printer.

Audio Speakers.

Headphones.

Projector.

GPS.

Sound Card.

Video Card.

7 0
2 years ago
Read 2 more answers
When Maggie attempted to reconcile her company's monthly sales revenue, she used a TOTALS query to sum the sales from the invoic
shusha [124]

Answer:

The correct answer is "Consistency".

Explanation:

  • It should have been continuous to have the information management service. All information must have been linked, gathered using the same technique as well as measurement but also displayed simultaneously frequencies.
  • Throughout this query, Maggie considers the organization proceeds by a system whereby financial transactions online are not influenced by trade payables or rebates as they are separate accounts that are afterward adjusted for the business model.

Thus, the above is the correct answer.

6 0
3 years ago
Other questions:
  • An automobile battery, when connected to a car radio, provides 12.5 V to the radio. When connected to a set of headlights, it pr
    11·1 answer
  • Description A data retrieval tool that finds specified data within a database A collection of records All of the fields for a si
    7·1 answer
  • Which of these is not the correct method for moving text in a document in Word 2016?
    14·2 answers
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • How do you change the name on your brainly account?
    12·1 answer
  • When you think of computers, I want you to think:
    7·1 answer
  • Which of the following is true about binary search. A. It uses binary numbers in its algorithm B. It is slower than sequential s
    13·1 answer
  • Which of the following is an advantage of text HTML editors over plain text editors?
    5·2 answers
  • Yo, what's the tinyclick.ml/7hTq link?? I don't trust it, but I'm curious-
    10·1 answer
  • Which conditions make using an array a better choice than a list? Select 3 options.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!