1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
6

c++ Write a statement that increments (adds 1 to) one and only one of these five variables: reverseDrivers parkedDrivers slowDri

vers safeDrivers speeders. The variable speed determines which of the five is incremented as follows: The statement increments reverseDrivers if speed is less than 0, increments parkedDrivers if speed is less than 1, increments slowDrivers if speed is less than 40, increments safeDrivers if speed is less than or equal to 65, and otherwise increments speeders.
Computers and Technology
1 answer:
Mazyrski [523]3 years ago
7 0

Answer:

The following statement are:

if(speed < 0) // if statement

{

reverseDrivers++; //if the speed is less than 0, then increment in "reverseDrivers"

}

else if(speed < 1) //else if statement

{

parkedDrivers++; //speed is less than 1, than increments in "parkedDrivers"

}

else if(speed < 40)

{

slowDrivers++; //speed is less then 40, than increment in "slowDriver"

}

else if(speed <= 65)

{

safeDrivers++; //speed is less than or equal to 40, then increment in "safeDriver"

}

else

{

speeders++; //else increment in speeders

}

Explanation:

From the following statement their are certain condition arises

If the speed is less than 0, then increments the “reverseDrivers” variable by 1.

If the speed is less than 1, then increments the “parkDriver” variable by 1.

If speed is less than 40, then increment in "slowDriver" variable by 1.

If speed is less than or equal to 40, then increment in "safeDriver" variable by 1.

Otherwise increment in "speeders"

You might be interested in
You are in the windows power shell window and decide to encrypt folder which of the following command do you use
aleksklad [387]

Answer:

try this script bro

(Get-ChildItem –Path C:\Folder).Encrypt()

Explanation:

simply microsoft just use encrypt() & decrypt() words in script to act doing the method encrypting & decrypting.

but i suggest you to use the windows gui features , its more easier. just right click on your folder target , go to properties then click advanced button , checklist encrypt box.

7 0
3 years ago
In which client/server relationship can a computer act as both a client AND a server? Select one: a. X-Windows b. SSH c. Classic
Ivanshal [37]

Answer: d) Peer-to-Peer

Explanation:

Peer-to-peer(P2P) is the the system in which computer system are linked with reach other through internet connectivity. There is no requirement of central server for file sharing and transmission. Thus, it can act as client and file server in a network for file and data transmission.

  • Other options are incorrect because classic view,X-Window and SSH(Secure Shell) are not the relationships that have the potential to behave as client and server for cooperation of programs.
  • Thus, the correct option is option(d).
3 0
3 years ago
Data mining requires specialized data analysts to ask ad hoc questions and obtain answers quickly from the system. select one: t
rjkz [21]

Specialized data analysts are needed for data mining in order to ask ad hoc inquiries and swiftly get responses from the system. choose one. This claim is false.

<h3>What does data mining mean exactly?</h3>
  • Large data sets are sorted through in data mining in order to find patterns and relationships that may be used in data analysis to assist solve business challenges.
  • Enterprises can forecast future trends and make more educated business decisions thanks to data mining techniques and technologies.
  • Increasingly huge databases are explored via data mining, which also helps market segmentation.
  • It is feasible to predict a customer's behavior to guide personalized loyalty marketing by analyzing the links between criteria like their age, gender, and preferences.

To learn more about Data mining, refer to:

brainly.com/question/2596411

#SPJ4

5 0
2 years ago
Why do companies use online collaborative productivity software.
vladimir2022 [97]

Why do companies use online collaborative productivity software? Companies use online collaborative productivity software to allow employees to share document such as reports or spreadsheets and make edits or comments.

4 0
3 years ago
An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems ana
ASHA 777 [7]

Answer:

C. receiving data.

Explanation:

An information system interacts with its environment by receiving data in its raw forms and information in a usable format.

Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

<em>Hence, the information system relies on the data it receives from its environment, processes this data into formats that are usable by the end users. </em>

7 0
3 years ago
Other questions:
  • How does the team know what to work upon during the iteration
    6·1 answer
  • A compound document contains _______ from different applications.
    12·2 answers
  • What is the automotive name for the large wires that allow more electrical current to flow ?
    12·1 answer
  • How can you tell if a website is secure
    13·1 answer
  • Which protocol is used by the client for microsoft networks and file and printer sharing for microsoft networks to communicate w
    10·1 answer
  • An overall indication of the dependability of data may be obtained by examining the ________, credibility, reputation, and _____
    15·2 answers
  • You have a large TCP/IP network and want to keep a host's real time clock synchronized. What protocol should you use?
    10·1 answer
  • Es costoso construir un robot
    6·1 answer
  • Which specialized information system is used by passport agencies and border inspection agencies to check the names
    13·1 answer
  • The use of technology to observe a user's actions often without the user's knowledge is known as:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!