1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MatroZZZ [7]
3 years ago
15

Which XXX and YYY correctly output the smallest values? Vector user Vals contains integers (which may be positive or negative).

Choices are in the form XXX/YYY. // Determine smallest (min) value int minval; XXX for (i = 0; i < uservals.size(); ++i) { if (YYY) { minval - userVals.at(i); cout << "Min: " << minval << endl; minval - uservals.at(); /uservals.at(i) < minval minval = 0; /userval > minval minval - uservals.at(); /uservals.at(i) > minval minval - 0; /userval < minval
Computers and Technology
1 answer:
liubo4ka [24]3 years ago
3 0

Answer:

The answer is "minVal - userVals.at(0); /userVals.at(i) < minVal  "

Explanation:

In the question, it uses minVal instead of XXX to hold the very first arra(userVal) element, and rather than YYY you choose a conditional statement to check which integer is lower than minVal to index of loop increment. It changes the value of the minVal if the condition is valid. It's completely different if we talk about another situation.

You might be interested in
What is Game Theory?
AleksandrR [38]

Answer:

the branch of mathematics concerned with the analysis of strategies for dealing with competitive situations where the outcome of a participant's choice of action depends critically on the actions of other participants

Explanation:

In simple terms Game theory is the study of how and why people make decisions.

8 0
3 years ago
If we develop a new policy for our environment that requires us to use complex and automatically generated passwords that are un
stepan [7]

Answer:

The answer is "Login complexity will be increased very exponentially".

Explanation:

In computer science, The password is also known as a series of characters, which allows you to use the validation process to validate any customer's privacy.  

  • It is normal usage of passwords that work together with a username to make it, it only accessible by the user, and to give the user accessibility to a computer, software or web page.
  • If the password is more complex so, it is hard to learn, and it also provides login complexity, that's why we must use a less complex password.
7 0
3 years ago
What types of activities are ideal for a robot to perform?
LUCKY_DIMON [66]

The type of activities that are ideal for a robot to perform are; Repetitive tasks

Robots are machines that are programmable by a computer which have the capacity of automatically carrying out a complex series of actions.

Now, robots are used in a wide array of industries which include manufacturing, assembly and packaging, transport, earth and space exploration, e.t.c.

The most common use are found primarily in the automobile industry where they are used to carry out repetitive tasks and those that are difficult or hazardous for humans.

Read more about robots at; brainly.com/question/9145476

3 0
3 years ago
Why are peripherals added to computers?
Novay_Z [31]

Answer:

To expand their capabilities

Explanation:

They allow users to do more with computers

7 0
3 years ago
Select the answer that best describes the activity
Anastasy [175]

Answer:

software piracy

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • What are tags?
    13·1 answer
  • ] why was drone-defense equipment deployed at airports in the United Kingdom?
    13·1 answer
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • The Beaufort Wind Scale is used to characterize the strength of winds. The scale uses integer values and goes from a force of 0,
    10·1 answer
  • . Suppose that name is a variable of type string. Write the input statement to read and store the input Brenda Clinton in name
    5·1 answer
  • If your DTP document contains watermarks on every page, where can you place them?
    10·1 answer
  • An individual posing as an online gamer accesses information stored in an unsuspecting user’s computer by placing a program in h
    11·1 answer
  • A(n) _____ is a network connection device that can build tables that identify addresses on each network.
    10·1 answer
  • What report provides data on how specific sections of a website performed?
    6·1 answer
  • state how to transfee information from website to el processing document in computers and technology.​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!