1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murljashka [212]
3 years ago
7

Write a function that accepts an argument for a persons name. The method should loop through the number of characters in the nam

e sending each character to the screen each on a separate line.
#include

#include

using namespace std;

int main()

{

Plese fill in.....thanks
Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
4 0

Answer:

#include <iostream>

#include<string.h>

using namespace std;

void printCharacter(string name){

   for(int i=0;name[i]!='\0';i++){

       cout<<name[i]<<endl;

   }

}

int main()

{

   string name;

   cout<<"enter the name: ";

   cin>>name;

   printCharacter(name);

}

Explanation:

first include the two libraries iostream for input/output and string library for using the string.

then, create the main function and declare the variable type string.

cout instruction is used o display the message on the screen.

cin is used to store the value in the name variable.

after that, call the function. The program control move to the the function. In the function for loop is used to print the character one by one until end of the name.

You might be interested in
Importance of type casting in programming ​
chubhunter [2.5K]

Answer:

Typecasting, or type conversion, is a method of changing an entity from one data type to another. It is used in computer programming to ensure variables are correctly processed by a function. An example of typecasting is converting an integer to a string.

mark me brainliesttb :))

4 0
2 years ago
Julio is the department head for his company's customer service department. His staff has complained that they spend countless h
shusha [124]
It's answer A. blog (you're gonna need it).
6 0
3 years ago
Read 2 more answers
What are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, r
san4es73 [151]

Answer:

A. Rules

Explanation:

Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player

4 0
3 years ago
What makes smartphones so fragile?
In-s [12.5K]
Glass screen probably
7 0
3 years ago
Charles Mott works for a company called VeriSign that acts a trusted third party to verify information. One of Charles' largest
balu736 [363]

Answer:

Option (B) i.e., Certificate authority is the correct option to the following question.

Explanation:

The following option is correct because it an organization or company who validating the identification of that object that exists and it also verifies the information of the third party.

Option A is incorrect because it is the tool or software that protects the system from the outsiders or the malware.

Option b is incorrect because Online certificate is issued for any software or application or the certification in the field of study.

8 0
3 years ago
Other questions:
  • How do you uninstall a program using the Control Panel?
    10·1 answer
  • Rachel completed typing an official docment with a word processing program. She wants to make sure that her document has no typo
    15·2 answers
  • I need someone who knows HTML to finish the code.
    12·2 answers
  • Was the big blue button thing a good decision or bad?<br> *I think it was a bad idea.
    15·2 answers
  • What is the first step to creating a PivotTable?
    11·1 answer
  • The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or V
    12·2 answers
  • What is the first priority when building or using vex robots
    10·2 answers
  • Many web pages use a <br> structure to define an area of focus
    13·1 answer
  • What is the launching of a 3-D map called?
    12·1 answer
  • What option can be used by a system administrator to ensure that dynamic updates are made only by known clients when you have a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!