1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
balandron [24]
3 years ago
6

Write C++

Computers and Technology
1 answer:
crimeas [40]3 years ago
5 0

Answer:

u can see the answer in this picture

You might be interested in
What is jcl language on the mainframe?
Pavel [41]
Job Control Language on the mainframe is the name for scripting language used on IBM mainframe operating system to instruct how to start a subsystem.
5 0
4 years ago
What is the defining difference between computer security and information security?
Alekssandra [29.7K]
Computer security is protection from theft or damage to their hardware, software, or information, as well as disruption or misdriection of the services they provide. As information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of information.
4 0
3 years ago
Orphaned data is also created by the way that the hard drive allocates space on the hard drive for information that the user wan
Anika [276]
It think the answer to that question maybe true
8 0
3 years ago
Which line of code will use the overloaded multiplication operation?
maks197457 [2]

Answer:

def __mul__(self, b):

Explanation:

correct edge 2021

4 0
3 years ago
Function of network security​
myrzilka [38]

Answer:ffffffffffffgggggg

Explanation:vvvc

5 0
4 years ago
Other questions:
  • Text, numbers,graphics, sounds entered into a computer's memory during input operations are referred to as
    11·1 answer
  • If you have cable internet service, what protocol is used between the head end connection and the cable company's network
    8·1 answer
  • Playstation network live updates pes 2018 does it cost extra
    13·1 answer
  • Define
    15·1 answer
  • TP is commonly used to __________ and __________ files to a server.
    5·1 answer
  • . What type of device is a computer? Where does it use?​
    14·1 answer
  • ____________ define the allowable interactions between subjects and objects. credentials responsibilities procedures access cont
    15·2 answers
  • You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What
    7·1 answer
  • Who likes my meme? :)
    9·2 answers
  • You can change the ____ or position of text within a document's margins.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!