1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Studentka2010 [4]
3 years ago
11

Super Scores

Computers and Technology
1 answer:
Sindrei [870]3 years ago
8 0

Answer:

Replace:

<em>//CODE HERE  </em>

<em>//output the max score for each section and compute & output total too.  </em>

with the following lines of codes:

<em>int num;  </em>

<em>for(int i=0; i<numtakes; i++) { </em>

<em>for(int j=0; j<numsections; j++) { </em>

<em>   cin>>num; </em>

<em>   if(num>maxScores[j]){ </em>

<em>       maxScores[j] = num;    } </em>

<em>}  } </em>

Explanation:

Your program is poorly formatted. (See attachment for correct presentation of question)

What's required of the us is to complete the source program.

The codes has been completed in the Answer section above, however, the line by line explanation is as follows:

<em />

<em>This line declares num that gets user for input for each entry</em>

<em>int num;  </em>

<em>This line iterates through the number of takes</em>

<em>for(int i=0; i<numtakes; i++) { </em>

<em>This line iterates through the number of sections</em>

<em>for(int j=0; j<numsections; j++) { </em>

<em>This gets user input for each entry</em>

<em>   cin>>num; </em>

<em>The following if condition determines the greatest entry in each section</em>

<em>   if(num>maxScores[j]){ </em>

<em>       maxScores[j] = num;    } </em>

<em>}  } </em>

<em>For further explanation, I've added the complete source file as an attachment where I used comments to explain each line.</em>

Download cpp
You might be interested in
When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be ____ to t
Katen [24]

Answer:

Incidental.

Explanation:

When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be incidental to the offense.

For instance, the list of customers used by human traffickers is considered to be generated through an incidental system.

8 0
2 years ago
If you configure any more passwords on the switch, will they be displayed in the configuration file as plain text or in encrypte
Elza [17]

Answer:

The "service password-encryption" global configuration command encrypts passwords configured before and after the command is issued.

Explanation:

A switch is an intermediate network device that is used to transfer frames to nodes on its collision domain. It operates in the Data-link layer of the OSI model.

Switches uses media address control (MAC) table, containing the MAC addresses of the nodes in the network, to determine the destination of nodes.

In the global configuration mode in a switch, the password and other protocols are configured. The service password-encryption command in the global execution mode encrypts passwords configured before and after the command.

4 0
3 years ago
An administrator is writing into a database and received an error detailed in the exhibit. What two steps need to be taken to re
d1i1m1o1n [39]

An administrator is writing into a database and received an error detailed in the exhibit. The two steps to be taken to resolve this are :

Move the Execute SQL statement to be between Connect and Disconnect. Move the Prompt Message to be before the Disconnect statements.

Explanation:

  • Dynamic SQL refers to SQL statements that are generated at run-time.
  • To disconnect from a database, in the Database Navigator or Projects view, click the connection and then click the Disconnect button in the toolbar or click Database -> Disconnect on the main menu
  • You can also right-click the connection and click Disconnect on the context menu
  • The PROMPT command may be used to display messages to the user, perhaps supplying a short summary of what your script is going to accomplish.
  • The SQL EXECUTE command executes an SQL command and binds the result to 4D objects (arrays, variables or fields).
  • A valid connection must be specified in the current process in order to execute this command. The sqlStatement parameter contains the SQL command to execute.

7 0
3 years ago
What is an ISP?<br> in computer Networking
defon
ISP is an abbreviation for internet service provider.
Hope this helps!
4 0
3 years ago
Read 2 more answers
the part of the computer that provides access to the internet is the A.modem B. keyboard C. monitor or D.system unit
marta [7]
A. the modem provides the wifi or internet to the computer
6 0
3 years ago
Read 2 more answers
Other questions:
  • Read the scenario below and then answer the
    14·1 answer
  • PLEASE ANSWER ASAP
    7·1 answer
  • The Spanning Tree Protocol operates at the Network layer of the OSI model.
    13·1 answer
  • Pride Group of Companies is making tremendous profits in different categories of electronic goods. The group of managers have to
    12·1 answer
  • Why can't this app have people ask riddles.
    8·1 answer
  • Which quality should an experiment have to be replicable and valid? O clearly detailed results O a well-cited research paper O s
    7·1 answer
  • What is the first step in finding a solution to a problem?
    9·2 answers
  • Explain why a holiday on a cruise liner will be an ideal holiday​
    12·1 answer
  • Taran wants to work in the technology field but is unsure of which career to pursue. He has been told he has strong people skill
    14·1 answer
  • Using programming libraries is one way of incorporating existing code into new programs.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!