1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Minchanka [31]
2 years ago
13

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in

the string in c++
Computers and Technology
1 answer:
Eddi Din [679]2 years ago
5 0
#include
#include

using namespace std;

int CountCharacters(char userChar, string userString){
int result = 0;
for(int i = 0;i if(userString[i] == userChar){
result++;
}
}
return result;
}

int main(){
string userString;
char userChar;
cin>>userChar>>userString;
cout< return 0;
}
You might be interested in
Icons for the most commonly used applications on a Mac can be found here. Dock Menu bar Toolbar Toolbox
Kazeer [188]

What do you mean please reply to this comment with a question.

4 0
4 years ago
Read 2 more answers
You have received a Word memo from your supervisor outlining the five-year strategic plan for your company, which operates in a
Maksim231197 [3]

Answer:

The correct option to the following question is C.) Rights Management Services.

Explanation:

The Right Management Services is also referred to as RMS or AD(Active Directory) RMS.

It is the MS Windows security tool which provides us with persistent data protections by enforcing our data access policy.

Our documents are protected with the RMS and the AD RMS, it is an application by which the documents are associated with and be RMS-aware.

It actually called the Windows RMS but its name was changed in MS Windows 2008, RMS to AD RMS.

7 0
4 years ago
Which of the following identifies the two reasons why people may not purchase organic produce as often as conventionally grown p
sasho [114]

Answer:the taste and the appearance of the produce

Explanation:

5 0
3 years ago
Linda is a core member of a project. She estimates the cost of the project, creates project requirements, and notes risks. What
lord [1]

Explanation:

no linda is the core member not rhe project

4 0
3 years ago
Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management stra
belka [17]

Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.

It gives an illustration of the relationship of the National preparedness mission elements of risk.

Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.

However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.

Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.

When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.

THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.

"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.

Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.

5 0
3 years ago
Other questions:
  • The initial step of the five-step problem-solving model is to: A. Explore alternatives B. Clarify values. C. Develop an approach
    9·1 answer
  • I NEED HELP RIGHT NOW !!!!!!!!!!!!!!!1
    10·2 answers
  • Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output param
    12·1 answer
  • In the Mouse Properties window, you can
    6·1 answer
  • How do u make a bored builder
    8·2 answers
  • What is a algorithm
    6·1 answer
  • 12. How many different documents can<br> you have open at one time?
    8·1 answer
  • Write a program that declares and initializes a variable representing the weight in milligrams from the keyboard. The program di
    11·1 answer
  • Describe the ways in which a computer-aided design (CAD) drawing makes the details of an image easier to understand.
    11·2 answers
  • The amount of detail an image can hold is called it’s
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!