1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sasho [114]
3 years ago
10

5 similarities between the C and C ++ language​

Computers and Technology
1 answer:
mel-nik [20]3 years ago
3 0

Answer:

Check explanation

Explanation:

Well, for one thing, C++ is a superset of C. This means:

  • They both have similar syntax
  • Similar code structure
  • Similar compilation

Another similarity is that pretty much all of C's keywords and operators are used in C++ with the same use.

They both also use the semicolon (;) as the statement terminator.

There you go. 5 similarities between C and C++.

You might be interested in
Jackson builders is constructing new homes in the Parkway subdivision.The company needs the logic for an application that ncalls
lord [1]
<span>The calculatePrice() method can be written in C. It will use and return doubles (which allows for decimals). It will calculate the house price of $100K + $20K per bedroom and $30K per bathroom. Next it will take that price and append the sales percentage and return that value.
double calculatePrice(decimal numBedrooms, decimal numBathrooms, decimal salesPercentage)
{
decimal housePrice = 100000 + (20000 * numBedrooms) + (30000 * numBathrooms);
return housePrice + (housePrice * salesPercentage);
}</span>
8 0
4 years ago
Write a note on antispyware progrmaes?​
MAXImum [283]

Answer: See explanation

Explanation:

Spyware refers to the software that has

a malicious behavior which gathers information about an individual or organization and then sends the information gathered to another entity which is used in causing harms to the user such as the privacy violation of the user.

Antispyware programmes are also called the spyware removal tools and they're the software which are used in the detection of harmful spyware which are then removed from the system. Examples include Avira, Norton, Avast, McAfee etc.

5 0
3 years ago
Which of the following is not a standard method called aspart of the JSP life cycle*
Kazeer [188]

Answer:

*jspService()

Explanation:

These are the steps in JSP life cycle.

1. Conversion JSP page to Servlet .

2.Compilation of JSP page(test.java)

3.Class is loaded (test.java to test.class)

4.Instantiation (Object is created)

5.Initialization (jspInit() method is only called once at the time of servlet     generation )

6.Request processing(_jspService() method is used for serving requests by JSP)

7.JSP Cleanup (jspDestroy() method is used for removing JSP from use)

There is no *jspService() method in the JSP life cycle.

8 0
4 years ago
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
Susan is troubleshooting a problem with a computer's network cabling. At which layer of the Open Systems Interconnection (OSI) R
Alisiya [41]

Answer:

Physical layer

Explanation:

The physical layer is responsible for the physical cable or wireless connection.

6 0
3 years ago
Other questions:
  • Josh needs to write a research report for his Civics class. Which file type will allow him to save his file?
    12·2 answers
  • 1.Write the Qbasic program to find sum of any 10 different numbers.
    12·1 answer
  • Write algorithm to find (a+b)^2=(a+b)*(a+b)​
    9·1 answer
  • How is the EF​ computed? A. ES​ + Activity time B. LF minusActivity time C. ​Min{LS of all immediate following​ activities} D. ​
    11·1 answer
  • Create a list of 15 colleges in Texas
    8·2 answers
  • Word processing software, spreadsheet software, database software, and presentation software are examples of what category of co
    6·1 answer
  • An example of a __________________ in the United States are computer hackers, whose members engage in actions that subvert autho
    11·1 answer
  • Anyone understand coding? Please Help! Thank you! :)
    8·1 answer
  • 1 Which of the following could work as bits for a binary system?
    9·1 answer
  • a _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!