1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
9

How are computers 35 years ago and how are they presently and how are they going to be in the next 35 years

Computers and Technology
1 answer:
antoniya [11.8K]3 years ago
5 0
Answer:

Jason = <span>20yrs.old</span>

Mandy = <span>15yrs.old</span>

Explanation:

Let

J = Jason's age

M = Mandy's age

<span>J+M=35</span> ..... eq. 1

<span>J−10=2<span>(M−10)</span></span> ..... eq. 2

From eq. 1

<span>J=35−M</span>

Substitute this in eq. 2.

<span><span>(35−M)</span>−10=2<span>(M−10)</span></span>

<span>35−10−M=2M−20</span>

<span>35−10+20=2M+M</span>

<span>45=3M</span>

<span><span>453</span>=<span><span>3M</span>3</span></span>

<span>15=M</span>

<span>J=35−M</span>

<span>J=35−15</span>

<span>J=<span>20</span></span>

You might be interested in
What do I do if my friend wants me to watch a video at my house?
steposvetlana [31]

Have him email the link to you and click on the it.

hope this helps, have a great day!

3 0
3 years ago
Read 2 more answers
Kendra needs to configure a visual alert for an appointment that she is creating for next week. What should she configure?
sergiy2304 [10]
Reminder
To alert her
4 0
3 years ago
You have installed Windows Server 2016 on a new server and want to centralize user logons and security policies. What type of so
shusha [124]

Answer:

Directory Service

Explanation:

3 0
2 years ago
Ethics issues are significant in the area of online privacy because laws have not kept pace with the growth of the Internet and
raketka [301]

Answer:

The answer is "True"

Explanation:

In the given statement some information is missing that is "True or false"

Internet security is the scope of the privacy and security of the electronic exchange of data. It's a common term that refers to something like many factors, technologies, and technology used to protect records, contact, and interests, confidential and private.

  • The security of the Internet is recognized as the privacy of the User.
  • It is secure and unique passphrases or two-factor authentication.
7 0
3 years ago
Implement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the intege
maria [59]

Answer:

/*C++ program that prompts user to enter the name of input file(input.txt in this example) and print the sum of the values in the file to console. If file dosnot exist, then close the program */

//header files

#include <fstream>

#include<string>

#include <iostream>

#include <cstdlib> //needed for exit function

using namespace std;

//function prototype

int fileSum(string filename);

int main()

{

string filename;

cout << "Enter the name of the input file: ";

cin >> filename;

cout << "Sum: " << fileSum(filename) << endl;

system("pause");

return 0;

}

/*The function fileSum that takes the string filename and

count the sum of the values and returns the sum of the values*/

int fileSum(string filename)

{

//Create a ifstream object

ifstream fin;

//Open a file

fin.open(filename);

//Initialize sum to zero

int sum=0;

//Check if file exist

if(!fin)

{

cout<<"File does not exist ."<<endl;

system("pause");

exit(1);

}

else

{

int value;

//read file until end of file exist

while(fin>>value)

{

sum+=value;

}

}

return sum;

}//end of the fileSum

Explanation:

This is a C++ program that prompts user to enter the name of input file(input.txt in this example) and print the sum of the values in the file to console. If file dosnot exist, then close the program.

Check attachment for sample output screenshot.

5 0
3 years ago
Other questions:
  • Which of the following tasks is least effective at preventing a computer virus?
    14·2 answers
  • . Reorder the following efficiencies from smallest to largest:
    9·1 answer
  • What is the answer and why?
    12·1 answer
  • What is a IT form? any help would be great thnx
    14·2 answers
  • Write java code that displays all the objects in a stack in the order in which they were pushed onto it. after all the objects a
    5·1 answer
  • Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
    5·1 answer
  • To display data in a certain manner, like alphabetical order, is called
    5·2 answers
  • Demographics refers to
    7·1 answer
  • Explain ONE negative outcomes of not matching an ICT product to the correct audience:
    15·1 answer
  • What's the difference between a robot and a machine?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!