1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nataly_w [17]
3 years ago
13

What error occurs in the following program? #include using namespace std; int main() { int number1, number2, sum; cout <<

"Enter number 1:"; cin >> number1; cout << "Enter number 2:"; cin >> number2; number1 + number2 = sum; cout << "The sum of number 1 and number 2 is " << sum; return 0; }
Computers and Technology
1 answer:
Nady [450]3 years ago
7 0

Answer:

1. ‘cout’ was not declared in this scope.

2. ‘cin’ was not declared in this scope.

3. lvalue required as left operand of assignment.

Explanation:

The code gives the error cout and cin was not declare. This error means, we not include the library where they define.

cout and cin is the input/output instruction and they include in the library iostream file.

the last error is lvalue required as left operand of assignment.

lvalue means the assignable value, we actually do the wrong assignment.

number1 + number2 = sum;

here, sum is is the assignment variable. so, it must be in the right side of the '=' operator.

sum = number1 + number2 ;

Now, the above is correct. the value number1 plus number2 is assign to sum.

You might be interested in
What are the advantages of hybrid computer
Lemur [1.5K]

The advantages of hybrid computers are:

  • They have a large amount of computing speed speed that is often helped by the all-parallel configuration made by the analog subsystem.
  • It is very useful in terms of numerical solutions for any work of differential equations and also in flight simulation.

<h3>What is an advantage of hybrid computing?</h3>

Hybrid cloud computing is known to be one that gives businesses a lot of control over their data and it is one that have a good or better security as it tends to lower the risk of exposure of data.

Note that,The advantages of hybrid computers are:

  • They have a large amount of computing speed speed that is often helped by the all-parallel configuration made by the analog subsystem.
  • It is very useful in terms of numerical solutions for any work of differential equations and also in flight simulation.

Learn more about hybrid computing from

brainly.com/question/21474132

#SPJ1

3 0
2 years ago
1110011*110011 binary multiplication
Ganezh [65]

122113420121

Explanation:

8 0
3 years ago
Read 2 more answers
Jennifer is trying to install an anti-malware program on a computer that she believes might be infected. During the installation
Vlad [161]

Answer:

Install in Safe Mode

Explanation:

If a system is corrupted with malware, installing an antivirus or anti-malware might not be possible. The malware can hide in a system and it can prevent the anti malware software from installing or scanning on the system.

Running your system in safe mode and install is the best option. Safe mode blocks third party programs and hardware drivers. A malware should not start when a system is in safe mode, therefore you can install the anti-malware and scan to remove all the malware from your system.

5 0
3 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
3 years ago
What is the smallest negative integer that can be represented in two's complement system in which each value is represented by e
olga nikolaevna [1]

Answer:  Two's complement is a mathematical operation on binary numbers, and is an example of a radix complement. It is used in computing as a method of signed number representation.

8 0
3 years ago
Other questions:
  • To move one screen to the left press ____.
    9·1 answer
  • Vhat is output by the code below?<br><br> PLEASE HELP!! TIME LIMIT!!
    5·1 answer
  • DSSS uses a chipping code to encode redundant data into the modulated signal. Which two of the following are examples of chippin
    12·1 answer
  • What factors should you consider when buying a hard drive?
    8·1 answer
  • What occurs when a website can know enough about a person's likes and dislikes that it can fashion offers that are more likely t
    9·1 answer
  • Every presentation should have a beginning, a middle, and an end.
    10·1 answer
  • Given the following table of students, assignments, and grades for a single class:
    6·1 answer
  • Which of the following describes why graphical interfaces quickly became popular after their introduction to the mass market?
    5·1 answer
  • Are you familiar with measuring using a ruler? When have you ever used a ruler to measure, and who taught you how to use the rul
    13·1 answer
  • Select each of the tasks that you could complete using a word processor.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!