1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Keith_Richards [23]
3 years ago
6

Summary

Computers and Technology
1 answer:
Karo-lina-s [1.5K]3 years ago
8 0

Answer:

Replace the comments with:

for(x = 0; x < NUM_CITIES; x++){

      if(inCity == citiesInMichigan[x]){           foundIt = true;}

  }

  if(foundIt){ cout<<"Exists";}

  else{cout<<"Does not exists";}  

 

Explanation:

This iterates through the cities

for(x = 0; x < NUM\_CITIES; x++)\{

This checks if current city in the array matches the city input by the user

if(inCity == citie sIn Michigan[x])\{           foundIt = true; If yes, foundIt is set to true}

  }

If foundIt is true, print "Exists"

if(foundIt){ cout<<"Exists";}

If foundIt is false, print "Does not Exists"

  else{cout<<"Does not exists";}  

<em>See attachment for complete program</em>

Download cpp
You might be interested in
Which area of study involves microeconomWhich area of study involves microeconomics? A. a nation's ability to meet consumer dema
AysviL [449]

Answer:

The correct answer is C. Consumer behavior and preferences.

Explanation:

hope it will help :)

6 0
3 years ago
Discovery of a vulnerability in a software program can potentially be sold to the government. Group of answer choices True False
enyata [817]

Discovery of any vulnerability in a software program can potentially be sold to the government: True.

<h3>What is vulnerability?</h3>

Vulnerability is any form of weakness, flaw or defect that is found in a software application, computer system, or network, which can be exploited by an attacker (hacker), in order to gain an unauthorized access and privileges to sensitive user data that are stored in a computer system.

This ultimately implies that, a vulnerability in a software application can potentially be sold to the government, so as to avert and mitigate any form of unauthorized access and privileges to sensitive user data.

Read more on vulnerability here: brainly.com/question/25813524

#SPJ1

4 0
2 years ago
All of the following are incentives proprietary schools use to attract a student except
IRISSAK [1]
Idk what the answer choices are
4 0
3 years ago
Read 2 more answers
I will give Brainliest to the best answer, I need urgent HELP
laila [671]
The answer is B. Range
4 0
3 years ago
Nonverbal messages from the movie it​
RUDIKE [14]

Answer:

ya you say right

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • About n processes are time-sharing the CPU, each requiring T ms of CPU time to complete. The context switching overhead is S ms.
    12·1 answer
  • Shelly praised Susan via email for how well she executed an employee training program last week. Shelly is engaging in the _____
    6·1 answer
  • Okay so, not really a question but whatever it’s been bothering me.
    9·2 answers
  • Assume that play_list refers to a non-empty list, and that all its elements are integers. Write a statement that associates a ne
    7·1 answer
  • Computing devices translate digital to analog information in order to process the information
    8·1 answer
  • Write a program that reads a stream of integers from a file and writes only the positive numbers to a second file. The user shou
    5·1 answer
  • Icon view, list view, and details view are all common views provided by which kind of program?
    12·2 answers
  • Write a program to find the sum of first 10 even numbers in qbasic​
    15·1 answer
  • WILL GIVE BRAINLIEST!! NO LINKS!!!
    12·2 answers
  • Cyber vulnerabilities to dod systems may include
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!