1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
3 years ago
6

Create a text file named employee.dat containing the following data: b. Write a C++ program to read the employee.dat file create

d in Exercise 5a and produce a duplicate copy of the file named employee.bak.
Computers and Technology
1 answer:
Paul [167]3 years ago
8 0

Answer:

1000 500 250 125 the output

Explanation:

write a program using integers userNum and x as input,  userNum divided by

x four times.  EX : If  the input is 2000 2 the output is 1000 500 250 125

You might be interested in
If a company uses multimedia applications in addition to normal file and database sharing, which transmission is more efficient?
Sonbull [250]

The transmission that is more efficient is the full duplex transmission.

<h3>What is database?</h3>

A database simply means an organized collection of a structured information in a computer program.

In this case, when a company uses multimedia applications in addition to normal file and database sharing, the efficient transmission is the full duplex transmission.

Learn more about database on:

brainly.com/question/26096799

#SPJ12

3 0
2 years ago
Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
Karo-lina-s [1.5K]

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

<h3>Artificial intelligence, machine learning, and malware</h3>

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

brainly.com/question/399317

4 0
2 years ago
Collins and quillian explained the results of priming experiments by introducing the concept of _____ into their network model.
insens350 [35]
<span>Spreading Activation This is a model of working memory, which can be otherwise called here and now memory in lay man's term, that tries to clarify how the mind forms related thoughts, particularly semantic or verbal ideas. The spreading enactment show is one way intellectual clinicians clarify the preparing impact, which is the noticeable wonder that a man can all the more rapidly review data about a subject once a related idea has been presented. As indicated by this model, semantic long haul memory comprises of a huge, interrelated system of ideas. At the point when a man is given any idea, the ideas most firmly associated with it are initiated in that individual's psyche, getting ready or "preparing" him or her to review data identified with any of them</span>
4 0
3 years ago
Given the list of customer segments below please create a new list of the names of the segments only using(a) a for loop(b) a li
Alchen [17]

Answer:

new_segment = [ ]

for segment in segments:

   new_segment.append({'name': segment, 'average_spend': money})

print( new_segment)

Using list comprehension:

new_segment =[{'name': segment, 'average_spend': money}  for segment in segments]

Using map():

def listing(a):

   contain =  {'name': segment, 'average_spend': money}

   return contain

new_segment = [ ]

new_segment.append(map( listing, segment))

print(list(new_segment)

Explanation:

The python codes above create a list of dictionaries in all instances using for loop, for loop in list comprehension and the map function which collect two arguments .

7 0
3 years ago
David needs to create a password. He uses "rtjjkliusfvwr." Which of the following best explains the weakness in his password?
Darina [25.2K]
I would say because it is hard to remember. Unless each one of those stands for a world, kind of like an acronym, then good luck remembering it!
3 0
3 years ago
Read 2 more answers
Other questions:
  • What is another name for “low-angle lighting”? Side lighting Top lighting Under-lighting Three-point lighting
    15·2 answers
  • How can earn more answer from brainly less than two minutes, please
    9·1 answer
  • As the team leader, John ensures that all his teammates are clear in the team goals they need to achieve. He demonstrates the qu
    12·2 answers
  • Whats the difference between search engine and web browser?
    6·2 answers
  • Which of the following are valid values for a boolean value in programming? (Select all that apply)
    8·1 answer
  • What will be the output of the following code? &lt;?php $foo = 'Bob'; $bar = $foo; $bar = "My name is $bar"; print $bar; print $
    8·2 answers
  • Many of the first photographers were actullay scientists and inventors
    11·1 answer
  • Define<br>output<br>devices<br>.<br>Give<br>any<br>three<br>examples<br>.<br>3.​
    8·2 answers
  • Can someone help me so I don’t fail this class:(
    14·1 answer
  • When defining a system
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!