1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Strike441 [17]
3 years ago
6

Create a text file named employee.dat containing the following data: b. Write a C++ program to read the employee.dat file create

d in Exercise 5a and produce a duplicate copy of the file named employee.bak.
Computers and Technology
1 answer:
Paul [167]3 years ago
8 0

Answer:

1000 500 250 125 the output

Explanation:

write a program using integers userNum and x as input,  userNum divided by

x four times.  EX : If  the input is 2000 2 the output is 1000 500 250 125

You might be interested in
A Network Intrusion Detection System watches for potentially malicious traffic and _______ when it detects an attack.
serious [3.7K]

A Network Intrusion Detection System watches for potentially malicious traffic and triggers Alert when it detects an attack.

<h3>What is Network Intrusion Detection System?</h3>

Network Intrusion Detection System can be regarded as the security system that helps in detection of potentially malicious traffic and gives notification.

Therefore, Network Intrusion Detection System helps to triggers Alert when it detects an attack.

Learn more about Network Intrusion Detection System at:

brainly.com/question/8118353

6 0
3 years ago
All of the following are true of using the database approach to managing data except Group of answer choices Decentralized manag
kolezko [41]

Answer:

Decentralized management of data

Explanation:

  • The database management approach is one approach based on the improved standard file solution with the use of DBMS and allows for the stimulus access of data with a large number of users.
8 0
3 years ago
When programming, the word "execute" means which of these?
Inga [223]

Answer:

to run!

Explanation:

hope this is helpful!

7 0
3 years ago
This technology was developed in the 1980s and was a successful attempt to provide services for voice, video, and video traffic
sveticcg [70]

Answer:

SONET was the only one on the list created near the 1980s (1985)

Good luck!

<em>~Awwsome</em>

8 0
3 years ago
(a)Ms word is a isa word processing software ,(b)hub provides physical connection between all computers, State true or false​
8090 [49]

Answer:

true

Explanation:

true in answer in the question

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following button should always be included when designing a navigation pictures escape contact FAQ
    5·2 answers
  • What Will Social Media Look Like in the Future?
    6·1 answer
  • Write a program which capitalize every character after full stopin a given sentence
    11·1 answer
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • 1.What is the term referring to an amount of money that is owed?
    6·2 answers
  • Big Project, Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly
    9·2 answers
  • It is important to know the terms of use of any website because why
    12·2 answers
  • Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string,
    9·1 answer
  • Effective scrum masters apply which coaching behavior
    5·1 answer
  • A sensitive manufacturing facility has recently noticed an abnormal number of assembly-line robot failures. Upon intensive inves
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!