1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kondaur [170]
2 years ago
8

What is the contents of the vector names after the following statements? vector names; names.push_back(“Ann”); names.push_back(“

Bob”); names.pop_back(); names.push_back(“Cal”);​
Computers and Technology
1 answer:
SIZIF [17.4K]2 years ago
4 0

Answer:

ann, cal

Explanation:

You might be interested in
What would you use to see what network adapters are installed in your windows computer?
Lesechka [4]
I wouldn't see anything, because my computer does not use any network adaptors.
6 0
2 years ago
What options does the Table Tools Layout contextual tab contain? Select three options.
alex41 [277]

Answer:

This tab contains two tabs, Design and Layout that give you the ability to quickly format your table, insert or delete rows and columns, set the alignment for cells, and format the typography of the text in your table

Explanation:

4 0
3 years ago
Read 2 more answers
Software that covertly monitors and records pieces of information such as web surfing activities is referred to as:
nekit [7.7K]
<span>Software that covertly monitors and records pieces of information such as web surfing activities is referred to as </span>spyware.
6 0
3 years ago
Which option can be used to access more settings than are available in the Backstage view
laiz [17]

Answer:

the answer is orientation setting because orientation setting allows u to force your device in a particular screen

6 0
3 years ago
Why are tariffs and other trade barriers economically harmful when they save some jobs
Dmitry [639]
Tariffs economically harmful save they save some jobs because higher prices are forced upon the people by the tariffs will cost more jobs than they save.

7 0
3 years ago
Other questions:
  • a computer that no longer works after having minor repair work done to it may have been damaged by ______.
    6·1 answer
  • A ___________ organizes related commands together, under a tab.
    15·1 answer
  • What does www stand for?
    10·2 answers
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • Jane wants to add a chart to her presentation so she’ll click the Insert tab and in the Images group, she’ll click the Chart but
    5·1 answer
  • The picture that graphically since the items you use in windows is called
    7·1 answer
  • Compared to a virtual image, a real image
    15·2 answers
  • If a hacker can steal your passwords by installing malware that captures all the messages you type, what kind of malware did the
    8·2 answers
  • ______ lets people access their stored data from a device that can access the Internet.
    6·1 answer
  • A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!