1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
14

Assume user_name equals "Tom" and user_age equals 22. What is printed on the console when the following statement is executed? c

out << user_age << " \nis " + user_name << "'s age.";
Computers and Technology
1 answer:
12345 [234]3 years ago
8 0

Answer:

The ouput of the given code is :

22

is "Tom's age.

Explanation:

Here in this code the variable user_name and user_age are initialized to  "Tom" and 22 respectively as statement is given in the question i.e  cout << user_age << " \nis " + user_name << "'s age.";.This line will print the user_age i.e 22 after that the control moves to the next line and print is "Tom's age.

Following are the code in c++

#include <iostream> // header file

#include <string>

using namespace std;

int main() // main function

{

   string user_name="Tom";

   int user_age= 22;

cout << user_age << " \nis " + user_name << "'s age.";

return 0;

}

Output:

22

is "Tom's age.

You might be interested in
You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
choli [55]

Answer:

Default gateway

Explanation:

The default gateway would be needed to change for the configuration value because when plugged to the computer system into other's network. The Internet Protocol addressing for network users that is static. Then, the other user finds the system can connect on a similar subnet with hosts and not with hosts on another subnet and no further computer systems have facing the problem.

3 0
4 years ago
Read 2 more answers
__________ is software that comes hidden in free downloadable software that tracks online movements, mines the information store
denis23 [38]

Answer:

Spyware

Explanation:

Spyware is the software which is used to track the online movements, it also track the user action on the computer they are also called sneakware  or stealthware

  • This software is used  in the business purpose which it may be used in the office to track the record of employee in the working hours .
  • Spyware  software is used to track the information without knowing the user.

 

7 0
3 years ago
When you evaluate the use of digital media, how has it affected the newspaper business? The rise of digital media has caused new
Harrizon [31]

Answer:

The rise of digital media has caused newspaper subscriptions to decline significantly because people are finding their news online.

It is A

3 0
3 years ago
A major ozone depletion happened in the 1900s. What was it caused by
melomori [17]
It was caused by air pollution and the extreme heat built up underneath it. <span />
3 0
4 years ago
Read 2 more answers
The operating system (OS) of an information system contains the software that executes the critical functions of the information
Feliz [49]

Answer:

a. True

Explanation:

An information system (IS) can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

On a related note, the software application that executes the critical functions of an information system (IS) are contained in its operating system (OS).

Basically, the computer's memory, processes, softwares and hardwares are typically being managed by the operating system (OS). Thus, an OS makes it possible for different programs to run simultaneously (more than one software program running concurrently) and access the computer's memory, central processing unit (CPU), and storage.

4 0
3 years ago
Other questions:
  • Who are some of my emails not all deleting on my android i have to use my laptop to see them to delete them?
    12·2 answers
  • Which of the following are examples of the concept of layered access in physical security? Select one: a. Firewall, IDS, CCTV b.
    11·2 answers
  • The addresses a program may use to reference memory are distinguished from the addresses the memory system uses to identify phys
    15·1 answer
  • What is ‘Software Quality Assurance’?
    10·1 answer
  • Which of the following are breach prevention best practices?Access only the minimum amount of PHI/personally identifiable inform
    11·1 answer
  • Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
    13·1 answer
  • Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
    12·1 answer
  • Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics
    12·1 answer
  • Trish has bought a new computer that she plans to start on after a week
    5·1 answer
  • Write a class definition line and a one line docstring for the class Dog. Write an __init__ method for the class Dog that gives
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!