1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
14

You are building a system for a Housing Society, such as Bahria Town. You are supposed to design a very

Computers and Technology
1 answer:
Rudiy273 years ago
6 0

Answer:

122e²edafetejtjthrhhrhehegegegritirutu5oydodyo6ifyifi5did5i5isi5itirusritursududtustudidtidtiisisus5us5ususrursusududtidtidtidudtidtidtidtidtursustusriruausrysrysysrusrus4sus4us4y4as4us4us4us4us4ys4u5su5su

Explanation:

tiyrygtghyyhhgghghhghnghgmjfhfhhrzjjxtxthxthxthztjtjtdjstjdtjztjztjztjtzjzhzxhztzthzrhztuzthhuthhtxxfhzthzthzttuhzthtzjztuzztuztutuztfhruryryryegegrhrhrhrhrhgfhdhdhdhdhfddhdhhfhfhjfhfhfhfhdhdhddhdhjdhjff

You might be interested in
What types of storage can be used to access your data on another computer?
Ivenika [448]
<span>You could use cloud storage. Basically, the things you save are actually saved on another computer, that is, on another server, that is used as a hard drive for many pcs. You can access the cloud storage if you have internet and it works like a normal hard drive. There are even laptops that don't have storage other than cloud storage.</span>
6 0
3 years ago
Declare a structure with a type name: Car containing:
OLga [1]

Answer:

C++ code is given below

Explanation:

#include <iostream>

#include <cctype>

#include <string.h>

#include <cstring>

#include <sstream>

using namespace std;

struct Car {

public:    

char reportingMark[5];    

int carNumber;

string kind;

bool loaded;

string destination;

};

void input(Car *);

void output(Car *);

int main() {

Car *T = new Car;    

input(T);

output(T);    

delete T;    

return 0;

}

void input(Car *T)

{

string str, s;

cout << " Enter the reporting mark as a 5 or less character uppercase string: ";

cin >> str;

for (int i = 0; i < str.length(); i++)

T->reportingMark[i] = toupper(str[i]);

cout << " Enter the car number: ";

cin >> T->carNumber;

cout << " Enter the kind: ";

cin >> T->kind;

cout << " Enter the loaded status as true or false: ";

cin >> s;    

istringstream(s) >> boolalpha >> T->loaded;    

if (T->loaded == true) {

cout << " Enter the destination: ";

cin.ignore();

getline(cin, T->destination);

}

else

T->destination = "NONE";    

}

void output(Car *T)

{

cout << " Reporting Mark: " << T->reportingMark;

cout << " Car Number: " << T->carNumber;    

cout << " Kind: " << T->kind;

cout << " Loaded Status: " << boolalpha << T->loaded;

cout << " Destination: " << T->destination << " ";

}

7 0
4 years ago
What can you achieve if you divide your search engine marketing account into relevant campaigns and ad groups?.
Alchen [17]

Make sure that visitors receive relevant ads that pertain to their search query by segmenting your search engine marketing account into pertinent campaigns and ad groups.

<h3>What is search engine marketing? </h3>
  • A digital marketing tactic called search engine marketing (SEM) is used to make a website more visible in search engine results pages (SERPs).
  • The practice of promoting websites by making them more visible in search engine results pages, primarily through paid advertising, is known as search engine marketing.
  • The technique of obtaining traffic from search engines, either naturally or by paid advertising, is known as search engine marketing (also known as search marketing).
  • There are two basic sorts of search marketing: PSAs and SEOs (Search Engine Optimization) (Paid Search Advertising).

To learn more about search engine marketing, refer to:

brainly.com/question/20850124

#SPJ4

8 0
2 years ago
Which security testing activity uses tools that scan for services running on systems? reconnaissance penetration testing network
Fiesta28 [93]

Answer:

Network mapping.

Explanation:

Network mapping seems to be the method of mapping the server visibly and rationally in order to determine the relations at mid of the network as well as the not same nodes.

  • Network mapping is the practice of security checking using software to search against services running on networks.
  • Network performance applications and software contains certain network mapping functions that customize the network
7 0
3 years ago
________ a database rearranges data and objects in a database to make its size smaller
hodyreva [135]
<span>An attribute in a relation of a database that serves as the primary key of another relation in the same database is called a

</span>
8 0
3 years ago
Other questions:
  • How to you put a color into a cell? <br> a.Shading<br><br> b.Fill<br><br> c.Color<br><br> d.Insert
    8·1 answer
  • Enhancing and optimizing customer retention and loyalty is a major business strategy.
    15·1 answer
  • On a vehicle with a manual transmission, a frequent mistake is shifting
    11·1 answer
  • Recall the insertion-sort-like algorithm in Problem 4 from Homework 2, where you know that certain pairs of contiguous items in
    15·1 answer
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • Nikolas has a idea that he could use the compressed carbon dioxide in a fire extinguisher to propel him on his skateboard. Nikol
    13·2 answers
  • What is the information that there are 24 hours in a day and 365 days in a year considered?
    6·2 answers
  • My serious question that needs answering pronto!!!
    11·1 answer
  • Sistem komponen mekanikal yang terdapat pada sebuah basikal?​
    13·1 answer
  • The ___________ method returns the length of an array.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!