1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
4 years ago
15

cpp g Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print fo

rwards, then backwards. End each loop with a newline. Ex: If courseGrades
Computers and Technology
1 answer:
valentina_108 [34]4 years ago
8 0

Answer:

lol don't ask people to write code for you

assuming its an array, n is size.

normally:

for(int ele: courseGrades){

cout << ele <<" ";

}

cout << endl;

reverse:

reverse(courseGrades, courseGrades + n);

for(int ele: courseGrades){

cout << ele <<" ";

}

cout << endl;

You might be interested in
____ port is a connection in which eight data lines transmit an entire byte of data at one moment in time.
yarga [219]
Hi!

This is going to be a <em>parallel </em>port. It <span>can send various bits of data concurrently using multiple data lines. 

Hopefully, this helps! =)</span>
4 0
4 years ago
HELP!!! Bad things about Helen Keller. I'm doing a debate and i need to prove that Steve Jobs is better than Helen Keller!!
Luden [163]
Steve jobs invented a way for a large amount of people to communicate. Hellen Keller is an example for only a select people (deaf and blind) on how to communicate
6 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Which of the following is an object-oriented programming language?
Svetradugi [14.3K]

Explanation:

This is the correct answer

<h3>python</h3>
7 0
2 years ago
Two or more computers connected together is referred to as a(n)
son4ous [18]
Two or more computers connected together is referred to as a network.
So the answer is <span>B. network.</span>
8 0
3 years ago
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • When programming, the word "execute" means which of these?
    13·1 answer
  • Which is an example of withholding you might see on your pay stub
    14·2 answers
  • Why is it a good idea to save work in the cloud
    10·2 answers
  • Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void
    9·1 answer
  • In what country was the English royal family and nobility living before the Restoration?
    6·1 answer
  • Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression
    11·1 answer
  • How do I get the bot token for discord? (scripting etc)
    5·1 answer
  • Help me! I’ll mark you brainly
    13·1 answer
  • Where does Reiner take eren after they have a fight?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!