1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
2 years ago
7

1.Write a C++ program that allows the user to enter the phrase "I am smart". Output the first letter and last letter of the phra

se using string properties.
2.Write a C++ program to output the following values after they are loaded into an array: 67, 45, 12, 89, 46, 88 and 43.
PLS Help they are different questions
Computers and Technology
1 answer:
rusak2 [61]2 years ago
4 0

Answer:

1)

string value;

cout << "type I am smart";

cin >> value; // get user input from the keyboard

2)

int num1 = 67;

int num2 = 45;

int num3 = 12;

int num4 = 89;

int num5 = 46;

int num6 = 89;

int num7 = 46;

int num8 = 88;

int num9 = 43;

int numbers [ ] = {num1,num2,num3,num4,num5,num7,num8,num9} ;

//to load it as a function

int main ()

{

for ( n=0 ; n<5 ; n++ )

{

result += numbers[n];

}

cout << result;

return 0;

}

You might be interested in
What was the first video game ever invented
Sever21 [200]

Answer:

Pong

Explanation:

In 1958, a physicist created a tennis game in which he found the very first video game.

3 0
3 years ago
Read 2 more answers
IN EXCEL, File, menu , edit, insert are all located in ?
abruzzese [7]

Answer:

menu bar is the correct answer

hope it helps☺️

7 0
3 years ago
In which view are fields set up in MS Access?
Phantasy [73]

Answer:On the Home tab, in the Views group, click View, and then click Design View. In the table design grid, select the field or fields that you want to use as the primary key. To select one field, click the row selector for the field that you want.

Explanation:

7 0
3 years ago
Read 2 more answers
The ___________________ command is used to establish connectivity.
schepotkina [342]
The PING command is used to establish connectivity
4 0
3 years ago
Find true or false. A hacker is hacking software with access in sensitive information from your computer​
Alina [70]
ITS TRUE!!I SEARCHED IT
7 0
2 years ago
Other questions:
  • A label is any word that appears in a cell of a spreadsheet.<br> True<br> False
    5·2 answers
  • The benefits of flextime include:
    11·2 answers
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create form
    7·1 answer
  • Blank spaces or unseen control characters in a data file are referred to as
    5·2 answers
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for th
    13·1 answer
  • How will the health care professions be affected by all the computerized and technical advances concerning disabilities?
    9·1 answer
  • 4.9 Code Practice: Question 4 Edhisive
    14·2 answers
  • Copy the formula in cell M7 to the range M8:M15, and edit the copied formulas to return the value from the column indicated by t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!