1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Minchanka [31]
2 years ago
13

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in

the string in c++
Computers and Technology
1 answer:
Eddi Din [679]2 years ago
5 0
#include
#include

using namespace std;

int CountCharacters(char userChar, string userString){
int result = 0;
for(int i = 0;i if(userString[i] == userChar){
result++;
}
}
return result;
}

int main(){
string userString;
char userChar;
cin>>userChar>>userString;
cout< return 0;
}
You might be interested in
In the circuit shown in the figure above, what will happen when switches S1 and S3 are both closed? 
sp2606 [1]

Well, ya see, we need to have the picture of the circuit.

8 0
3 years ago
The ______ view connects perceptual capabilities to information available in the world of the perceiver. Multiple choice questio
jekas [21]

Answer:

Ecological

Explanation:

Please mark brainliest

4 0
2 years ago
What is this <br>name which console it is ​
ZanzabumX [31]

Answer:

ps3

Explanation:

becaus with is and I'm right

6 0
3 years ago
Read 2 more answers
Why is Resnick skeptical of calling the young people of today ‘digital natives’? Do you agree? Explain.
Nezavi [6.7K]

For question one, Resnick skeptical of calling the young people of today 'digital natives' will have to be agree. For agreeable reasons is because people who are called "digital natives", is because they are in a technological state that they are familiar with. Which means that if young people are in a state of technology and they are really into it, you have this unbreakable string tied to the waist and it hangs into you from a tree.  And for reason two, is because coding can be helpful. In situations like people hacking you, with coding, now that is when it comes in.

And for the others, I'll have to look at some more information I might have. But, here is your first answer is up above, If it isn't good enough, then let me know.

Hope this helps.

~Karleif

3 0
3 years ago
Which of the following are cloud computing resources?
aleksandr82 [10.1K]
All of the above because it is accessible through computer access if you were to download them to any type of iCloud work
3 0
3 years ago
Read 2 more answers
Other questions:
  • MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?
    11·1 answer
  • Which individual of the following would be most likely to be directly concerned with web security?
    14·2 answers
  • What is an example of a good URL?
    7·2 answers
  • Discuss the benefits of a system safety effort other than improved safety
    8·1 answer
  • Which statement best describes what happen to the temoporary working memory (RAM) of a computer when it shut down
    12·2 answers
  • Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
    8·1 answer
  • A search for reliable information is a search for what?
    14·1 answer
  • Which is the following is a valid email id<br><br>​
    13·1 answer
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
  • _________________ uses soap or detergent to physically remove germs, dirt, and impurities from surfaces or objects.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!