1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Temka [501]
3 years ago
11

Driving is expensive. Write a program with two inputs, a car's miles/gallon and the cost of gas/gallon both represented as doubl

e variables, and output the total drive cost for 10 miles, 50 miles, and 400 miles, all on the same line, each separated by a single space.
Output each floating-point value with two digits after the decimal point, which can be achieved by executing the command
cout << fixed << setprecision(2); once before all other cout statements. That is done only once in the code before any cout stamtent.

Ps:(when i run the program it says this-
Enter miles per Gallon:
Gas cost for ten miles :-nan
Gas cost for fifty miles :-nan
Gas cost for four hundred miles:-nan
Computers and Technology
1 answer:
Nataly_w [17]3 years ago
6 0

Answer:33

Explanation:

You might be interested in
An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this
jarptica [38.1K]

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

6 0
3 years ago
_______ is the protocol suite for the current Internet.
Gala2k [10]
A? not very sure sorry
8 0
3 years ago
Which property describes if a mineral breaks down into flatpieces​
marta [7]

Answer: Cleavage

Explanation:

3 0
3 years ago
Please list of 15 safety rules that you think should be practiced in the Computer Technology classroom/lab.
geniusboy [140]

Answer:

BE RESPECTFUL! Always treat the computer lab equipment AND your teacher and classmates the way that you would want your belongings and yourself to be treated.

No food or drinks near the computers. NO EXCEPTIONS.

Enter the computer lab quietly and work quietly. There are other groups and individuals who may be using the computer lab. Please be respectful.

Surf safely! Only visit assigned websites. Some web links can contain viruses or malware. Others may contain inapropriate content. If you are not certain that a website is SAFE, please ask a teacher or other adult.

Clean up your work area before you leave. All cords should be placed on the tables (not hanging off the sides). Headphones should be placed on the CPU/tower or monitor. Chair should be pushed under the tables. All trash, papers, and pencils should be picked up.

Do not change computer settings or backgrounds.

Ask permission before you print.

SAVE all unfinished work to a cloud drive or jump drive. Any work that is saved to the computer will be deleted when the computer is powered off or updated at the end of the day.

If you are the last class of the day, please POWER DOWN all computers and monitors.

Explanation:

tick me as brainlilist please

3 0
2 years ago
please help me with the 2 questions above. if you know a lot about game design I have lots more questions!
ratelena [41]

1 is A

2 is probably C or B but I don't use Unity so I can't help much with that one.

3 0
3 years ago
Other questions:
  • . The first step in devising security services and mechanisms is to develop a security policy True False
    11·1 answer
  • Does functionality provided by the app play an important role in a decision to
    13·1 answer
  • How can templates be made available to other users?
    15·1 answer
  • A real-world problem that might be explained or predicted through the creation of a computer simulation
    7·1 answer
  • Which of the following can a cell contain?
    9·2 answers
  • Why are there more producers then consumers?​
    6·2 answers
  • Answer the queston...........​
    7·2 answers
  • You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
    15·2 answers
  • Your task is to identify three or more ways that big data is being collected on a regular basis, including one data collection m
    9·1 answer
  • Lasses give programmers the ability to define their own types. <br><br> a. True<br> b. False
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!