1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PilotLPTM [1.2K]
3 years ago
13

Assignment 10 - 1/0 Streams and Files Create a C++ a program that will compute the average word length (average number of charac

ters per word) for a text file. The text file should be chosen by the user when the program is executed. • a blank space • a comma • a period • the beginning of a line • or the end of a line Your program should define a function that is called with the input-file stream as an argument. This function should also work with the stream cin as the input stream, although the function will not be called with cin as an argument in this program. Use the following text as a test for your program. Create a separate text file and paste the following paragraph into that file. Seeing, now, that there were no curtains to the win dow, and that the street being very narrow, the house opposite comman ded a plain view into the room, and observing more and more the inde corous figure that Queequeg made, staving about with little else but h is hat and boots on; I begged him as well as I could, to accelerate his toilet somewhat, and particularly to get into his pantaloons as soon as possible. He complied, and then proceeded to wash himself. At th at time in the morning any Christian would have washed his face; b ut Queequeq, to my Use the following text as a test for your program. Create a separate text file and paste the following paragraph into that file. Seeing, now, that there were no curtains to the win dow, and that the street being very narrow, the house opposite comman ded a plain view into the room, and observing more and more the inde corous figure that Queequeg made, staving about with little else but h is hat and boots on; I begged him as well as I could, to accelerate his toilet somewhat, and particularly to get into his pantaloons as soon as possible. He complied, and then proceeded to wash himself. At th at time in the morning any Christian would have washed his face; b ut Queequeg, to my amazement, contented himself with restricting his a blutions to his chest, arms, and hands. He then donned his waistcoa t, and taking up a piece of hard soap on the wash-stand centre table, dipped it into water and commenced lathering his face. I was watching to see where he kept his razor, when lo and behold, he takes the harpoon from the bed corner, slips out the long wooden stock, unsheathes the head, whets it a little on his boot, and striding up to the bit of mirror against the wall, begins a vigorous scraping, or rather harpoon ing of his cheeks. Thinks I, Queequeg, this is using Rogers's best cut lery with a vengeance. Afterwards I wondered the less at this o peration when I came to know of what fine steel the head of a harpoon is made, and how exceedingly sharp the long straight edges are alway s kept.
Computers and Technology
1 answer:
Svetlanka [38]3 years ago
6 0

Answer:

dgvky

Explanation:

You might be interested in
Declaring a member as ____ in the base class provides access to that member in the derived classes but not to anyone else. a. pu
Sidana [21]

When a member is declared as b. <u>protected</u> in the base class, it provides access to that member in the derived classes but not to anyone else.

<h3>What is a derived class?</h3>

A derived class can be defined as a type of class that inherits the information or members of a base (parent) class such as a car in a syntax.

Basically, a public class is accessible to everybody while a private class can only be accessed by users within the declared class. Also, a constant is a class whose value remains unchanged.

In Computer programming, when a member is declared as <u>protected</u> in the base class, it ultimately provides access to that member only in the derived classes but not to other members or anyone else.

Read more on data types here: brainly.com/question/20264183

#SPJ1

6 0
2 years ago
D. What is the work of the following features:<br>1. Foot note​
Bess [88]

Answer:

In footnotes, information is separated by commas, while in the bibliography, it is separated by periods.

In footnotes, the author's first name is listed first, while in the bibliography, the author's last name is listed first.

The titles of books and journals are put in italics.

The titles of articles are put in quotation marks.

All key words in titles are capitalized.

Explanation:

3 0
3 years ago
What is the first thing Kernel does when WinLoad turns over the starttup process to it
SashulF [63]

It activates HAL, reads more information from the registry, and builds into memory the registry key

4 0
3 years ago
Jennifer has to set up a network in a factory with an environment that has a lot of electrical interference. Which cable would s
jeka57 [31]

The answer is STP (Shielded Twisted Pair) cables .

Compared to Unshielded Twisted Pair, STP offers additional safeguards against Electromagnetic interference (EMI) and crosstalk. While UTP reduces some EMI, STP cables effectively block interference and ensure high-speed performance. STP cables have a metallic foil that cancels out electromagnetic interference. They are the preferred cables that protect against high-level EMI from, power lines, radar systems, or electromagnetic fields .



6 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
Other questions:
  • Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
    14·1 answer
  • What is the keyboard shortcut for the Undo command?
    8·1 answer
  • What area contains the command used to customize the print options in microsoft excel?
    9·1 answer
  • What are some situations where you might find it useful to use the “!” symbol in a program?
    9·1 answer
  • 30 points!!! Which type of a network is the Internet?
    8·2 answers
  • You wish to use a file system that creates a record or log of to-be-committed changes in the system so that if the system crashe
    14·1 answer
  • Why is it important to consider the clients temperature before doing the foot spa services?​
    13·1 answer
  • Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
    11·2 answers
  • Why is my Brainly scanner not work​
    5·2 answers
  • What does playstation network is currently undergoing maintenance?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!