1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Taya2010 [7]
3 years ago
10

What do libraries allow you to do in C++, and how do you incorporate libraries into a C++ program?

Computers and Technology
1 answer:
ale4655 [162]3 years ago
3 0

Answer:

Libraries in c++ allows us to use common functions and data structures such as vectors,queue,stack etc.You have already used  iostream library by which you are taking input and printing the output with the help of cin and cout functions.

for example you should use vector library to be able to use vector in your program.

You can incorporate library in your c++ program by writing #include<library name> at the starting odf the program.

for example:-

#include<iostream> //including iostream library.

#include<queue> //including queue library.

using namespace std;

int main()

{

queue<int> q; //declaring a queue of integer type.

q.push(23);//adding 23 in the queue q.

q.push(56);//adding 56 in the queue q.

q.pop();//deleting element from the queue.

cout<<q.front()<<endl;//printing fornt of the queue..

return 0;

}

output :-56

You might be interested in
What department is cyber security
Paul [167]

Answer:

United States Department of Homeland Security

The National Cyber Security Division (NCSD) is a division of the Office of Cyber Security & Communications, within the United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency.

<em>Give</em><em> </em><em>me</em><em> </em><em>brainliest</em><em> </em>

8 0
3 years ago
Read 2 more answers
When your Windows XP file becomes too large to fit in a single window, which of these components allows you to bring different p
IRISSAK [1]
<span>Scroll bar and scroll arrows allow you to bring different portions into view.</span>
8 0
3 years ago
When constructing policies regarding data _______________, it is important that these policies offer particular guidance on sepa
Rama09 [41]

Answer:

access

Explanation:

Managing users' access rights to digital resources within the organization's environment is a fundamental SoD control. As more services are requested by users, utilizing the built-in panels to check compliance with internal controls might become excessive. Companies require a comprehensive Identity Governance and Administration plan to monitor these user access and offer an authoritative source of identity definitions in order to ensure  SoD compliance.

6 0
2 years ago
______ is the software that blocks a user from being able to access your computer.
antiseptic1488 [7]
The answer is firewall. It is a network security device that observes inbound and outbound network traffic and chooses whether to allow or block specific traffic based on a well-defined set of security rules. Firewalls have been a first line of protection in network security for over 25 years. The firewall present a barrier between measured and secured internal networks that can be trusted and untrusted outside networks, for example the Internet. A firewall can be software, hardware, or even both.
8 0
3 years ago
True or false? Resistors regulate and limit electrical current. A. True B. False
Vikki [24]
Hello! I believe the answer for this is "True"!
3 0
3 years ago
Read 2 more answers
Other questions:
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • The collodion process was significantly more expensive than the cost of a daguerreotype
    10·1 answer
  • you were discussing software privacy with a friend were surprised to learn how software privacy can impact your life everyday. w
    10·1 answer
  • 1. Write a program to prompt the user to enter a single character and respond back whether or not the character is valid dna. 2.
    12·1 answer
  • When you start to type =av, what feature displays a list of functions and defined names?
    11·1 answer
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • In which circumstances would the view side by side feature be useful or helpful.
    15·2 answers
  • What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B
    8·1 answer
  • Defination of formula work sheet​
    15·1 answer
  • Write if true or false
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!