The C++ code for a function getchars() with one input string parameter, one character parameter, and one output vector parameter passed by reference is shown below.
Coding Part:
#include <iostream>
#include <vector>
using namespace std;
void GetValues(string inputString, char x, vector<char> &results)
{ int l = inputString.length(); for (int i = 0; i < l; i++)
{ if (inputString[i] != x)
{ results.push_back(inputString[i]);
}
}
}
int main()
{ string inputString; int i;
char x;
vector<char> results;
cin >> inputString;
cin >> x;
GetValues(inputString, x, results);
for (i = 0; i < results.size(); ++i)
{ cout << results.at(i) << endl; }
return 0; }
To know more about vector parameter, visit: https://brainly.com/question/29761259
#SPJ4
In his digital portfolio, Ben wants to locate each work he created. Where can he list details about the work in his digital portfolio?
A. résumé
B. tracking worksheet
C. reference letter
D. objective statement
Answer: it’s B
Explanation:
I just took the test and got it right. The other answer is incorrect.
A camera must gather light rays and them on a light-sensitive material.
A camera must gather light rays and focuses them on a light-sensitive material.
What is the most sensitive part of the camera?The most sensitive part of the camera is known as the digital sensor. This sensor captures the light coming from the lens to create an image. The digital sensor of a camera is one of its most delicate parts.
In photography, a device for recording an image of an object on a light-sensitive surface. It is essentially a light-tight box with an aperture to admit light focused onto a sensitized film or plate. Inside every lens is a mechanism to control the size of an opening, known as an aperture.
Therefore, a camera must gather light rays and focuses them on a light-sensitive material.
To learn more about the principles of the camera, refer to the link:
https://brainly.com/question/1599886
#SPJ9
Write a HTML code for displaying the following
i need an answer urgently
Answer:
Following are the code to the given question:
Explanation:
<html>
<body>
<p align="center" >VOCATIONAL SUBJECT</p>
<table align="center" border="2">
<tr>
<td rowspan="2">YEAR</td>
<td colspan="5">Vocational course</td>
</tr>
<tr>
<td rowspan="1">IT</td>
<td rowspan="1">CS</td>
<td rowspan="1">EL</td>
</tr>
<tr>
<td colspan="1">2016</td>
<td colspan="1">66</td>
<td colspan="1">68</td>
<td colspan="1">60</td>
</tr>
<tr>
<td colspan="1">2017</td>
<td colspan="1">77</td>
<td colspan="1">78</td>
<td colspan="1">80</td>
</tr>
<tr>
<td colspan="1">2018</td>
<td colspan="1">60</td>
<td colspan="1">67</td>
<td colspan="1">70</td>
</tr>
</table>
</body>
</html>
Were the colonists loyal to the British king after the war began? WILL GIVE BRANLEST PLS ASAP
Colonists were loyal to the French once the American Revolution began.
Colonists were never loyal to the king, so the war didn’t change anything.
There was no more British loyalty in the American colonies once the war began.
The colonists still felt loyalty for their king even after the start of the war.
Answer:
There was no more British loyalty in the American colonies once the war began.
Explanation:
The American Revolution began in 1775 as a response to the absolutist policies imposed by King George of Great Britain, specifically in economic and political matters, on the Thirteen Colonies and their citizens.
During the reign of King George, many civil, political and economic freedoms were suppressed (through the Intolerable Acts and other similar regulations), with which popular support for the monarchy was gradually losing size. Thus, new liberal ideologies began to appear, based on the postulates of philosophers such as John Locke or Jean Jacques Rousseau, who promoted the freedom of the individual and the respect of their natural rights as the fundamental premises of social organization.
For this reason, at the time of the Revolution, most of the settlers were pro-independence, while small minorities continued to support Great Britain. Precisely, these minorities, after the advance of the armed conflict, began to move towards what is now Canada, which continued to be a British stronghold.
Answer:
The colonists still felt loyalty for their king even after the start of the war.
Explanation:
Loyalists were American colonists who remained loyal to the British Crown during the American Revolutionary War, often referred to as Tories, Royalists or King's Men at the time. They were opposed by the Patriots, who supported the revolution, and called them "persons inimical to the liberties of America."
The while loop is this type of loop. A) post-test B) pre-test C) infinite Di limited E) None of these.
The while loop is a type of pre-test loop.
It's important to note that the pre-test loop executes zero or more iterations based on the condition being true or false. If the condition is false initially, the loop may never execute. In contrast, post-test loops execute the code at least once before testing the condition, and infinite loops execute indefinitely until a break or other condition is met. Therefore, the long answer is that while loops are pre-test loops that allow for conditional execution of code.
A while loop is a pre-test loop because it checks the condition before executing the loop's statements. If the condition is true, the loop will continue running; if it is false, the loop will stop. This type of loop is ideal when you need to perform an operation as long as a specific condition is met.
To know more about loop visit:-
https://brainly.com/question/30494342
#SPJ11
an example of a problem that might be solved recursively is searching files under a directory. group of answer choices true false
Recursive algorithms can be used to solve problems such as searching files under a directory. Recursion is a technique that involves breaking down a problem into smaller, simpler subproblems until a solution is found. This can be useful in file searching, as the algorithm can look through a directory, recursively searching all of its subdirectories until it finds the file it is looking for.
The Benefits of Recursive Algorithms for File SearchingRecursion is a powerful technique that can be used to solve a variety of problems, including searching files under a directory. This article will explore the advantages of using recursive algorithms for file searching, as well as discussing the ways in which these algorithms can be implemented.
Recursive algorithms are an effective way to search for files under a directory. They allow for a more efficient search, as the algorithm can look through a directory, recursively searching all of its subdirectories until the file is found. This is especially useful when searching for files in large file systems, as it eliminates the need to manually search through each directory. As a result, recursive algorithms can save time and resources when searching for files.
Learn more about searching files :
https://brainly.com/question/512733
#SPJ4
The OpenMP clause "num_threads(16)" results in 16 threads being forked.true/false
True. The OpenMP clause "num_threads(16)" specifies that the program should create 16 threads, which is commonly referred to as "forking" in OpenMP terminology.
The OpenMP clause "num_threads(16)" specifies the number of threads to be used in the parallel region. Therefore, if this clause is used within a parallel region, it will result in the forking of the specified number of threads, in this case, 16 threads. So, the statement is true. When the "num_threads" clause is used in an OpenMP parallel region, it sets the number of threads to be created to execute the code within the region. If the number of threads specified is greater than the available hardware threads, the actual number of threads created will be the number of hardware threads available.
Learn more about clause here-
https://brainly.com/question/19711531
#SPJ11
which type of operating system is usually used in personal computers
The most common operating system for personal computers is Windows.
what raid type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?
RAID level 0 is known as disk mirroring, because it involves connecting multiple drives in the server to the same disk controller card.
What are the levels of RAID?
RAID level options are 0, 1, 3, 5, 1+0, 3+0 (30), or 5+0. (50). The most commonly utilized RAID levels are 1, 3, and 5. The RAID levels are briefly summarized in the table below.
The Level 5 RAID is what?
Blacklist segmentation with redistributed parity makes up RAID 5. Parity information is spread across the disks, unlike in RAID 4. To function, all drives except one must be present. The distributed parity can be used to recalculate consecutive reads in the event of a singular drive failure, ensuring that no data is lost.
To know more about RAID level visit:
https://brainly.com/question/30022989
#SPJ4
difference between electrical and electronic devices
Answer:
The differences between electrical and electronic devices is that electrical uses as energy for necessary purposes, while electronic devices are being manipulated by the electrons that are inside of the device's battery :3
Explanation:
:3
Which is a correctly formatted Python tuple? [12, "circle", "square"] {"n":12, "shape1": "circle", "shape2": "square"} (12, "circle", "square") 12 circle square
Answer:
(12, "circle”, “square")
Explanation:
Python is a computer programming language that is used to write programs. In the python programming language, the Tuple is a data type that can be defined inside a parentheses "()". It is of immutable kind which means the elements inside the parentheses cannot be changed once the elements are inserted inside the tuple. It is also defined by "()" or by predefined function, tuple().
In the context, the correct format of python tuple is : (12, "circle”, “square").
Answer:
(12, "circle”, “square")
Explanation:
1. Sunday Times wants an analysis of the demographic characteristics of its readers. The
Marketing department has collected reader survey records containing the age, gender, marital
status, and annual income of readers. Design an application (Flowchart) that accepts reader
data and, when data entry is complete, produces a count of readers by age groups as follows:
under 20, 20–29, 30–39, 40–49, and 50 and older. Hint: Refer to the program discussed in
class Figure 6-15
2. Create the logic (Flowchart) for a program that calculates and displays the amount of money
you would have if you invested R10000 at 4 percent simple interest for one year. Create a
separate method to do the calculation and return the result to be displayed.
The main program (Flowchart) should prompt the user for the amount of money and passes it
to the interest-calculating method.
Answer:
GIRL
Explanation:
DALAGANG FILIPINA
14 YEARS OLD
NEED FRIENDS
questions explain the concept of a search engine. how has the utilization of mobile technologies impacted search engine optimization practices? describe how mashups create new benefits and functionality from existing data or information.
A search engine is a web-based tool that allows users to search for information on the internet. It uses algorithms to retrieve relevant web pages, documents, images, videos, and other content based on the user's search query.
How has the utilization of mobile technologies impacted search engine optimization practices?The utilization of mobile technologies has significantly impacted search engine optimization (SEO) practices. With the rise of smartphones and tablets, more people are accessing the internet through mobile devices.
This shift in user behavior has forced search engines to prioritize mobile-friendly websites in their search results. Mobile optimization has become crucial for businesses to ensure their websites are responsive, load quickly, and provide a seamless user experience across different mobile devices.
Additionally, mobile apps have become an important avenue for search engine visibility, as they can be indexed and appear in search results. Mobile technologies have also influenced local search, as users frequently search for businesses and services nearby using their mobile devices.
This has led to the emergence of local SEO strategies to help businesses appear prominently in local search results.
Learn more about algorithms
brainly.com/question/33268466
#SPJ11
which one of the following is an example of a disclosure threat?A. AlterationB. DenialC. EspionageD. Distruction
An illustration of a disclosure threat is espionage. A disclosure danger in the context of information security is the possibility of an unauthorised disclosure or exposure of sensitive or secret data.
A security risk known as a "disclosure hazard" arises when private or sensitive data is exposed to or made accessible to unauthorised individuals. Such dangers might manifest themselves in a number of ways, such as hacking, data breaches, theft, and espionage. A person or business may suffer serious consequences as a result of disclosing sensitive information, including economic losses, reputational damages, legal repercussions, and loss of competitive advantage. Organizations must take proactive actions to safeguard their data and put security measures like access limits, encryption, monitoring, and employee training into place in order to reduce these risks. Also, in the event of a data breach or disclosure event, strong incident response strategies and disaster recovery protocols are crucial.
Learn more about disclosure threat here:
https://brainly.com/question/14466247
#SPJ4
explain what the hexadecimal code in a MAC address represents
Answer:
An Ethernet MAC address consists of a 48-bit binary value. Hexadecimal is used to identify an Ethernet address because a single hexadecimal digit represents 4 binary bits. Therefore, a 48-bit Ethernet MAC address can be expressed using only 12 hexadecimal values.
What two documents describe the purpose of the optask link?
The two documents describe the purpose of the optask link are:
MTAMTNWhat is responsible for promulgating the Optask link message?The agency that is known to be assigned the role to promulgate the OPTASK LINK is known to be MTA which is said to be the physical configuration.
The MTA is known to be one that contains the physical configuration, functional organization, and also all of the operational methods used in the set up , establishment, changes, and operation of Multi-TDL Networks. The MTA is said to be the physical linkages and equipment of the MTN.
Hence, the two documents describe the purpose of the optask link are:
The MTAThe MTNLearn more about MTA from
https://brainly.com/question/24131225
#SPJ1
you are trying to clean up a slow windows 10 system that was recently upgraded from windows 8, and you discover that the 75 gb hard drive has only 5 gb of free space. the entire hard drive is taken up by the windows volume. what is the best way to free up some space?
The best way to free up space on a Windows 10 system with a full hard drive is to clean up unnecessary files and uninstall unnecessary programs. Unnecessary files are those files that are taking up space on your hard drive but are not important or useful.
The Windows operating system has a built-in tool called Disk Cleanup that can be used to clean up unnecessary files. To access it, type "Disk Cleanup" into the Windows search bar and open the program. Disk Cleanup will scan your hard drive for unnecessary files and give you the option to delete them. Another way to free up space is to uninstall programs that you don't use or need. To uninstall programs, go to Settings > Apps > Apps & features, and select the program you want to uninstall. Click the Uninstall button to remove the program from your system. Other things to consider to free up space are deleting large files, emptying the recycle bin, moving files to an external hard drive or cloud storage, and disabling hibernation mode.
Learn more about Windows operating system here https://brainly.com/question/1092651
#SPJ11
anybody wanna be friends?
yes Avacado?????????????????????
State what is meant by the terms: Parallel data transmission ......................................................................................................... ................................................................................................................................................... ................................................................................................................................................... Serial data transmission ........................................................................................................... ................................................................................................................................................... ...................................................................................................................................................
Answer:
parallel communication is a method where several binary digits are sent as a whole, on a link with several parallel channels.
serial communication conveys only a single bit at a time over a communication channel or computer bus.
Select all the correct answers.
In which TWO ways does e-governance empower citizens?
Citizens can obtain information directly from government websites.
Citizen can easily fix appointments with senators online.
Citizens do not need to travel to government offices.
Citizens can vote online on the bills introduced in the legislature.
i will have more questions under ur answers
Answer:
Citizens can obtain information directly from government websites.
Citizens do not need to travel to government offices.
Explanation:
These seem the most appropriate to me.
in the decision making proccess, after you have choose the right solution what is the nest step
In the decision-making process, after you have chosen the right solution, the next step is option A: act on your decision.
Why is making decisions important?Making decisions is crucial since it allows you to select from a variety of possibilities. It is important to gather all relevant information and consider the advantages and disadvantages of it before making a decision. It is vital to concentrate on actions that can assist in making the best judgments.
The most crucial step is evaluating options because this is when each choice is genuinely examined and taken into account. To genuinely make a decision, this step must be taken. The most crucial step is making a choice since it brings all the other options together.
Note that the phase before making a formal decision is evaluation. Making better decisions may be aided by the decision-maker learning from the results and as such, acting on all decision made will go a long way in your growth.
Learn more about decision-making process from
https://brainly.com/question/1999317
#SPJ1
See full question below
In the decision-making process, after you have chosen the right solution, what is the next step?
A act on your decision
B Reflect on your decision.
C gathering information
D identify the problem
If the internal transfer price charged by global-a is changed from cost plus 20 percent to cost plus 40 percent, what will be the implications for subsidiary global-b?
The change in the internal transfer price from cost plus 20 percent to cost plus 40 percent can lead to higher costs, reduced profit margins, and potential competitive disadvantages for subsidiary global-b. The specific implications will depend on the unique circumstances of global-b and its ability to adapt to the new pricing structure.
The change in the internal transfer price charged by global-a from cost plus 20 percent to cost plus 40 percent will have implications for subsidiary global-b.
When the internal transfer price is changed to cost plus 40 percent, it means that the subsidiary global-b will have to pay 40 percent more than the cost of the goods or services transferred from global-a. This increase in price may impact the profitability and cost structure of Global-b.
The implications for subsidiary global-b can vary depending on the specific circumstances. Here are a few possible implications:
1. Higher Costs: With the internal transfer price increasing by 40 percent, global-b will have to allocate more funds toward purchasing goods or services from global-a. This can result in higher costs for global-b, potentially reducing its profitability.
2. Reduced Profit Margins: If the increase in the internal transfer price is not matched by an increase in the selling price of the final product or service offered by global-b, it may lead to reduced profit margins. This can affect the overall financial performance of global-b.
3. Competitive Disadvantage: If the cost of goods or services from global-a increases significantly, subsidiary global-b may face challenges in competing with other similar companies in the market. Higher costs can make it difficult for Global-b to offer competitive prices to its customers.
It's important to note that the actual implications for global-b will depend on various factors such as the demand for the product or service, the competitiveness of the market, and the ability of global-b to adjust its pricing strategy.
In summary, the change in the internal transfer price from cost plus 20 percent to cost plus 40 percent can lead to higher costs, reduced profit margins, and potential competitive disadvantages for subsidiary global-b. The specific implications will depend on the unique circumstances of global-b and its ability to adapt to the new pricing structure.
To know more about the word profit margins, visit:
https://brainly.com/question/30236297
#SPJ11
In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.
Solution :
The value of the K2 cell is filled by IF and OR functions with structured references as :
\(K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")\)
Now if the syntax of the formula is not provided, then we can use :
\($K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$\)
The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :
--- staff member should served for more than 3 years
--- staff members should be college graduate
Final Test CSC 1301 (048) Full Name: 4) a) Write a program to generate Fibonacci sequence: 1 1 2 3 5 8 13 21 34 55 b) What is the output of the following unknown method for (int i-1; ca2; i+) for (int j-1;js 2:j++) for (int k 1; k<3; k++) System.out.print ("&"); System.out.print ("") System.out.println): 5) a) Write a program with a method called maximum that takes three integers as parameters a returns the largest of the three values (using Math.max() method). b) Write a program with a method called slope that take 4 parameters, (x1, y1, x2, y2 co-ordinates) as Inputs and returns the slope as an output. (Cal. Slope with formula y2-y1/x2-x1) 6) a) Write a program with a method called sphereVolume that accepts a radius as parameter and returns the volume of the sphere with that radius. For example, the call sphereVolume(2.0) should return 33.510321 by using the formula 4/3*pi* rr*r (use java constant Math.Pl) b) Write a program with a method revNum that accepts an integer parameter and returns the reverse of the number. For example, the call revNum(29107) returns 70192 7) a) Write a program prompting the user to enter the password. If the password is incorrect, it should continue asking 3 more times, (every time the password is incorrect). Finally, after 3 attempts it should display a message saying, all the attempts are done, try sometime later. If, you have entered correct password it should display message, your password is correct. b) What is the output of the following hello method public class Strange f public static final int MAX 5; public static void hellol1 int number 0; for (int count- MAX; count 3; count--) number +(count*count): System.out.printin(" The result is:"+ number); Public static void main (String [ ) args) hello);
The code of the subsequent code segment is shown here. The initial loop shall iterate only three times, first loop will loop three times more, or nine times, and the last loop will iterate three times more, or 27 times.
What in coding is segmentation?In addition to or in instead of paging, segmentation is a different method of allocating memory. In its most basic form, the program is divided into several sections, which are each a stand-alone entity that includes a subroutine and data structures. Segments can be any size, unlike pages.
What in C# is a code segment?The term "code segment" refers to a piece of a computer database that includes object code or a segment of the a project's address space that is comparable and provides details on commands and directives that can be executed. A code segment may also be referred to in the computing field as a particular text or just text.
To know more about code segment visit:
https://brainly.com/question/20063766
#SPJ4
What is the difference between printer and printing
Give three things a printer can print
Answer:
A printer is software that converts documents from computers into instructions for a print device to print on paper
Explanation:
it can print paper , carton , cards
PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS
A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:
Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50
Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.
It's pretty hard but I think it is 1,350
You have created a Web page in HTML. When it fails W3C validation, you try changing the HTML standard to make your code more compliant. But the page fails W3C validation tests each time, regardless of standard. Which element that you used to structure the page is failing to validate
Answer:
<table>
Explanation:
W3C validation is a test applied to web pages codes, containing HTML, CSS and other important web frameworks, to make sure that they follow the right syntax and semantics prescribed by the W3C - World Wide Web Consortium.
When a web page, or simple an HTML document, passes this test then it shows that the set rules for creating web pages, that can be easily rendered across many browsers, have been well followed.
There are many reasons why the test may fail. Some of them are highlighted as follows;
i. Not specifying the Doctype at all. For an HTML document to pass the W3C validation test, it is important to specify the Doctype which tells the browser how to treat the document. If HTML is specified as Doctype, then the browser treats the document as HTML. If none is specified, the browser does not know and may have to guess how to treat the document.
ii. Missing closing tags. HTML is a markup language and the use of tags are very important. Many tags have opening and closing parts such as;
<p> </p>.
Some are self closing such as;
<br />
Now, opening a tag and not closing it will make the test fail.
iii. Not completing important child tags. Some tags have child tags that are very important. Child tags are put inside another tag called the parent tag. An example is the <table> tag which has a few child tags such as <tr>, <tbody> e.t.c
Now, when creating a table, according to the W3C specifications, one or more of the <tr> or <tbody> child tag should be inserted.
What is a good general rule to follow when deciding whether to repair or replace a computer
Answer:
witch is most cheap and would benifit you use pros and cons
Explanation:
Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the same hourly pay rate. Megan has asked you to design a program that will allow her to enter the number of hours worked by each employee and then display the amounts of all the employees’ gross pay. You determine that the program should perform the following steps:
1. The text that is in the file is stored as one sentence. Incorporate the code that reads the file’s contents and calculates the following:
a. total number of words in the file
b. total average number of words per sentence
c. total number of characters in the file
d. total average number of characters per sentence
file name: employee_names.txt
file text:
George Thomas
Melinda Harris
Norah Jeddery
Jorge Ortiz
Samantha Gregory
Tanvi Gupta
William Edwards
Tania Gomez
Erica Sanders
Gracie Lou Freebush
Tony Montana
Obi-Wan Kenobi
Cruella De Vil
Marty McFly
Napoleon Dynamite
Answer:
she gives 10 dollars an hour
Explanation:
no
Ellen's laptop has a built-in 802.11n-capable wireless NIC. The wireless NIC worked perfectly yesterday when she loaned it to her nerdy friend Tom. Today, she cannot access the Internet via her wireless NIC. The NIC is not visible in Network Connections nor is it visible in Device Manager. What should she assume first?
Answer:
The NIC is disabled in CMOS
Explanation:
CMOS refers to the Complementary Metal Oxide Semiconductor. It is a technology that is used to generated integrated circuits.
It can be found in various types like microprocessors, batteries, etc
While on the other hand the NIC refers to the network interface controller in which the component of the computer hardware has connected the computer to its network. It can be done via wired and wireless.
Since in the given situation, it is mentioned that Ellen is not able to access the internet through wireless NIC neither it is visible in network connections nor it is shown in device manager so first she assumes that is nic is disabled in CMOS
and the same is to be considered