1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Karolina [17]
3 years ago
6

Assume that the variables gpa, deansList and studentName, have been declared and initialized . Write a statement that both adds

1 to deansList and prints studentName to standard out if gpa exceeds 3.5.
Computers and Technology
1 answer:
Alborosie3 years ago
3 0

Answer:

Following are the statement which is given below:

if (gpa > 3.5)  // check the condition if gpa exceeds 3.5.

{

deansList++;  // increment of 1 in the deansList variable

cout << studentName;  // display the studentName,  

}

Explanation:

The description of the statement

  • In the if statement we check the condition of "gpa" .if  "gpa"  is greater then 3.5 then it executed the statement inside the if block otherwise nothing will be executed.
  • if control moves to the if part it adds to 1 to the deansList.
  • Finally, display the value of studentName.
You might be interested in
Suppose you have a string matching algorithm that can take in (linear)strings S and T and determine if S is a substring (contigu
Zielflug [23.3K]

Answer:

no seishsssssssssssssssssssss

8 0
3 years ago
Read 2 more answers
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server
rjkz [21]

Answer:

Distributed DOS attacks.

Explanation:

Computers in a network or the network itself is are prone to cyber attacks. A cyber attack is a concept of taking advantage of computer network vulnerabilities, to retrieve information from the target source. An example of these types of security attacks is the denial of service (or DOS) attacks.

The DOS  or the distributed DOS attack prevents users form accessing or requesting a service that they are legitimately allowed, by flooding the target system with superfluous resource request from millions of computers, controlled by the attacker.

8 0
2 years ago
Sequential and direct access are two methods to locate data in memory. Discuss why major devices now a days use direct access? H
djverab [1.8K]

Answer:

Direct data access reduces the speed of retrieving data from memory or storage. Retrieving data and storing it in a cache memory provides direct access to data in the storage.

Explanation:

Sequential memory access, as the name implies, goes through the memory length location in search of the specified data. Direct memory access, provides a memory location index for direct retrieval of data.

Examples of direct and sequential memory access are RAM and tapes respectively. Data in sequential memory access can be access directly by getting data in advance and storing them in cache memory for direct access by the processor.

3 0
3 years ago
Spoderman memes<br> im scared-
DENIUS [597]

Don't be afraid of spooderman. He's hot.

4 0
3 years ago
Read 2 more answers
What is a possible effect of malicious code cyber awareness 2022.
ANEK [815]

The possible effect of malicious code cyber awareness 2022 is that It can

  • damage or compromise digital files.
  • Erase  hard drive and give room for hackers access to  PC.

<h3>What are  malicious code?</h3>

They are codes that are dangerous to operation of our computer system and includes;

  • viruses, trojan
  • horses, worms
  • macros

Learn more about effect of malicious code at:

brainly.com/question/17209742

5 0
2 years ago
Other questions:
  • Which of these jobs would be most appropriate for someone who majors in computer engineering? I need the answer ASAP Helping com
    14·2 answers
  • Which of the following is considered part of the process in the systems thinking example of a TPS?
    6·1 answer
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • In Modern operating system, the __ feature has dramatically improved user productivity.
    11·1 answer
  • Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerica
    15·1 answer
  • And then what happened,Paul Revere rhyme
    14·2 answers
  • 4.8 code practice question 2
    10·1 answer
  • A list is a collection that ______________
    9·1 answer
  • What is the difference between information poor and information rich<br>​
    13·1 answer
  • Suppose that you have the following definitions:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!