1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mkey [24]
3 years ago
14

What program we write for nested if in c++ to print something after else part but before inner if else

Computers and Technology
1 answer:
alina1380 [7]3 years ago
4 0

Answer:

if(condition){

}

else  {

  // something we want to print

  if(condition) {

     // ...

  }

  else {

     // ...

  }

}

Explanation:

Create code blocks using curly braces { ... }.

Use proper indentation to visibly make it clear where code blocks start and end.

You might be interested in
Select the characteristics that describe the evolution of computers that predate the personal computer (select all correct answe
emmasim [6.3K]

Answer:

Options (a), (b) and (d)

Explanation:

  • Option (a) is true that the computers have become smaller and smaller with advancement of the technology. The earlier version of computers used vacuum tubes and are very big in size.
  • As the years passed and due to the advancement of the transistors the computers have become smaller in size.
  • Option (b) is true. With the advancement in the research in circuits used in the computer like Integrated Circuits the computers have become faster.
  • The response time of the operating system has reduced drastically.
  • Option (c) is wrong option. The computers have become cheaper. The transistors are cheaper compared to the vacuum tubes which are used in the earlier computers.
  • The price of the same computer (memory and time efficiency) has become less in the coming years than in the previous years with the advancement in the research of transistors.
  • Option (d) is true. Now-a-days computers support more and more number of applications. Computers has more number of applications in various and diversified fields.
  • With the advancements in the computers, the computers are finding more applications in different fields like medicine, law, transport industries etc.
5 0
4 years ago
Write a SELECT statement that returns one row for each customer that has orders with these columns: The email_address from the C
bazaltina [42]

Answer:

Please find the attachment files of the queries:

Explanation:

In the all queries the select statement is used that selects the defined columns and use the function like sum, join, orderby, and groupby to perform the various operations, in which the sum is used to add columns or rows values, join is used for joining two or more tables, and orderby is used for return the table into ascending or descending order, and groupby is used for the count the value, calculate average and perform other operation and gives its return value.

7 0
3 years ago
John is considering his STEM education choices. He wants to begin working in the technology field as soon as possible.
wariber [46]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

STEM is a curriculum based on the idea of educating students in four specific disciplines — science, technology, engineering,  and mathematics — in an interdisciplinary and applied approach. The students who graduated in STEM-based education getting more paid and jobs than students who did not study the STEM-based education.

As in this question that John is considering his STEM education choices, and he wants to begin working in the technology field as soon as possible. He should pursue bachelor (graduate) degree in technology. Because after, passing out, he can begin working in technology easily.

5 0
3 years ago
Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture
lara31 [8.8K]

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

<h3>How does SaaS (Software as a service) impact organizational security posture?</h3>

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

<h3>What is organization level security in Salesforce?</h3>

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

brainly.com/question/24852211

#SPJ1

4 0
2 years ago
Recovery point objectives of a recovery plan specify ________.
Ksenya-84 [330]

Answer:

The correct option to the following question is an option (D).

Explanation:

Because RPO(Recovery point objective) is the objective in which we getting the greatest level of the privacy. confidence and the important thing is security for our resources.

The best thing is that the center of activity of the RPO in on the data and the overall elasticity of the loss of your company.

5 0
3 years ago
Other questions:
  • When a cache block has been modified since being read from main memory?
    10·2 answers
  • Cissy looks up a number in the phone book, pushes the book away, and then dials the number. why does she discourage any interrup
    8·2 answers
  • Help verify each identity<br><img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bcsc%7D%7Bcot%20%5C%3A%20x%20%20%5C%3A%20%2B%20%20%5C
    9·1 answer
  • A system that organizes and controls website content and can include features that help team members work together on webpages a
    13·1 answer
  • Given two int variables matricAge and gradAge, write a statement that gives gradAge a value that is 4 more than the value of mat
    11·1 answer
  • You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directl
    5·1 answer
  • Match the parts of the software applications with what they do.
    15·1 answer
  • The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
    15·1 answer
  • When is it appropriate to utilize the nat network connection type?
    8·1 answer
  • Question 3 of 25 In computer science, what is a developer? A. A person who organizes all the details of a project B. An individu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!