1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
14

Consider the following method.

Computers and Technology
1 answer:
larisa86 [58]3 years ago
6 0
Thank you please answer my other questions from today
You might be interested in
Jack and Diane are creating each ClassID following this pattern: first two letters of ClassName (one uppercase, one lowercase),
Norma-Jean [14]

Answer:

i dont know 123 IdK

Explanation:

6 0
4 years ago
Which of the following is the largest unit of information?
Mila [183]
What are the choices?

5 0
4 years ago
Read 2 more answers
Match each command group under Picture Tools to the appropriate tasks.
FrozenT [24]

Answer:

look at the attachment for correct answers.

6 0
3 years ago
Respond to Social EngineeringYou work as the IT security administrator for a small corporate network. The company president has
Cloud [144]

Answer:

Delete any emails that are attempts at social engineering

Explanation:

The actual URL of an email could tell if an hazardous, an unwanted or an unexpected email is being received, hence one can be sure of social engineering through this means. Hence, this could provide a solution to this problem.

4 0
4 years ago
Consider the following statements: #include #include class Temporary { private: string description; double first; double second;
Anna007 [38]

#include <iostream>  

#include <iomanip>  

using namespace std;  

class temporary  

{  

public:  

void set(string, double, double);  

void print();  

double manipulate ();  

void get (string&, double&, double&);  

void setDescription(string);  

void setFirst(double);  

void setSecond(double);  

string getDescription() const;  

double getFirst () const;  

double getSecond () const;  

temporary(string = "", double = 0.0, double = 0.0);  

private:  

string description;  

double first;  

double second;  

};  

void temporary::set(string a, double dblA, double dblB)  

{  

description = a;  

first = dblA;  

second = dblB;  

}  

void temporary::print()  

{  

cout << "\nDescription: " << left << setw(20) << description << endl <<  

" first: " << fixed << setw(10) << setprecision(2) << first << endl <<  

" second: " << fixed << setw(10) << setprecision(2) << second << endl;  

}  

double temporary::manipulate()  

{  

return first / 3.0 + second / 4.0;  

}  

void temporary::get(string& strDesc, double& dblFirst, double& dblSecond)  

{  

strDesc = description;  

dblFirst = first;  

dblSecond = second;  

}  

temporary::temporary(string d, double a, double b) : description(d), first(a), second(b) {}  

void temporary::setFirst(double dblFirst){first = dblFirst;}  

void temporary::setSecond(double dblSecond){second = dblSecond;}  

void temporary::setDescription(string desc){description = desc;}  

string temporary::getDescription() const {return description;}  

double temporary::getFirst () const{return first;}  

double temporary::getSecond () const {return second;}  

int main()  

{  

cout << "temporary a;";  

temporary a;  

a.print();  

cout << "a.setFirst(3.0): ";  

a.setFirst(3.0);  

a.print();  

cout << "a.setSecond(4.5): ";  

a.setSecond(4.5);  

a.print();  

cout << "a.setDescription(\"Picture Frame\") ";  

a.setDescription("Picture Frame");  

a.print();  

cout << "a.print(): ";  

a.print();  

return 0;  

}

6 0
4 years ago
Other questions:
  • Write a program LotheryPrinter that picks a combination in a lottery. In this lottery, players can choose 6 numbers ( possibly r
    9·1 answer
  • What's the problem with this code ?
    14·1 answer
  • In one to two sentences, explain how to save a new document.
    15·2 answers
  • Which function returns a valid value without any arguments?
    14·2 answers
  • The purpose of maintaining a network of digital forensics specialists is to develop a list of colleagues who specialize in areas
    7·2 answers
  • Help me please I will make BRAINLIEST
    5·1 answer
  • Heeeeeeelp :)<br><br> hwjkwdlfo;pk
    8·1 answer
  • Help FAST PLS in complete sentences discuss the process used to determine your credit score. Do you think it is fair? Why or why
    14·1 answer
  • Databases, authentication, and user accounts are all part of a website's ______________.
    9·1 answer
  • This class is missing a number of functions. Rewrite the class declaration to follow best practices, e.g, operators, three impor
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!