1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nekit [7.7K]
3 years ago
7

Each student has a record on a file consisting of the following data: Student last name, Student ID (numeric), GPA (a decimal nu

mber), major (a 3 digit code). a. Define a structure that could be used to process this data record. b. Declare an instance of this structure. c. Write ONE cout statement to show the Student name on the screen. HTML EditorKeyboard Shortcuts
Computers and Technology
1 answer:
slavikrds [6]3 years ago
7 0

Answer:

#include<iostream>

using namespace std;

struct student {

   string name;

   int id;

   float gpa;

   int major;

};

int main() {

   student student1;

   student1.name="Patil";

   student1.id=1;

   student1.gpa=9.80;

   student1.major=123;

   cout<<"First student last name: "<<student1.name;

}

Explanation:

A struct is a container or data structure in C and C++ that holds data that describes or represents an object. It is defined with the struct keyword. Just like a class constructor method, the struct is called with the struct name and the instance name of the struct.

The student struct above is used to create an instance of students registered in a school. The first student struct instance is the 'student1'.

You might be interested in
There are two circular grounds Ground-A and Ground-B. Ground-A is having diameter of 15 meters and Ground-B is having diameter o
ExtremeBDS [4]

Answer:

A

Explanation:

b/c the round of 'A' is less than ruond of'B'

4 0
3 years ago
There are a few simple rules that you can follow to store and manage files and folders in your computer. What is the most import
Nitella [24]
You should avoid deleting the unknown files to store your personal files and folders because if you delete that files it may be critical position with computer.
8 0
3 years ago
Read 2 more answers
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling int
Lubov Fominskaja [6]

Answer:

The answer is "Option B".  

Explanation:

The main drawback of commercial security is, that the software may not protect digital technology against data mining, and they are not known to be the  imperial tools, that's why the only option B is correct, and certain options are wrong, which can be explained as follows:

  • In option A, It used to provide a sequence of instructions, which is used in security.  
  • In option C, It doesn't use in security, that's why it is wrong.
  • Option D and Option E are wrong because in software there is no use of court and new software, it only upgrades the software.
4 0
3 years ago
Think about a career you would like to have 10 years from now.
WITCHER [35]

Answer: Scientist

Explanation: Scientists use technology to record data, as well as using technology to study different things, for example scientists use computers to track DNA.

6 0
3 years ago
1. Which of the following is required to create a computer simulation?
Sonbull [250]
1. Data
2. Input
3. Experimentation
4. Calculates Physics
5. You owe me.
6. Do your work next time.
7. You will never be able to enjoy a nice pipe and gin and use an app like this like a trivia game if you don't force yourself to completely understand your work.
8. I sound like your dad.
9. I am right.
6 0
3 years ago
Other questions:
  • Part 1: Create an application that allows you to enter student data that consists of an ID number, first name, last name, and gr
    14·1 answer
  • A user clicked an email link that led to a website than infected the workstation with a virus. The virus encrypted all the netwo
    10·1 answer
  • Pressing the e key while in edit mode will exit the interaction mode<br><br> true<br><br> false
    7·1 answer
  • Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is
    7·1 answer
  • The merge sort algorithm sorts using what technique?
    8·1 answer
  • Which type of financial institution typically has membership requirements?
    14·1 answer
  • Please answer it’s timed
    11·1 answer
  • In which drawer do you find blocks that allow you to use the A and B buttons on your micro:bit?
    13·2 answers
  • Besides your computer, where else can you find and use an operating system?
    11·1 answer
  • In additon to setting up services, what other tasks does a sysadmin have to keep in mind? check all that apply.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!