Mystring is declared as a string and is the only variable declared. which is a valid assignment?

Answers

Answer 1

Since myString is declared as a string and is the only variable declared. the  valid assignment is myString = "H";

What is myString?

The term  MyString(int currentSize) is known to be a kind of a constructor that is known to be used for an empty string of the currentSize elements.

What is an Object?

The "objects" is know to be a tool that is used to make a C++ program and they are known to be called classes.

Note that  a class is said to be organized such as or the same as a data structure in C and A class is one that is made up any number of variables just similar to  a data structure, but it also has  all of the functions that work on that data.

Therefore, Since myString is declared as a string and is the only variable declared. the  valid assignment is myString = "H";

Learn more about myString from

https://brainly.com/question/27812580

#SPJ1

myString is declared as a string and is the only variable declared. Which is a valid assignment?

myString = 'Hello';

myString = Hey;

myString = "H";

myString = [Hoy];


Related Questions

you physically cable access to the switch, are not prompted for a password and can access the ios this is the default operation

Answers

You physically cable access to the switch, are not prompted for a password, and can access the IOS. This is console default operation.

If you're like most people, you're probably used to having to enter a password in order to access a computer or device. However, when it comes to cabling into a switch, the default operation is to not require a password.

This means that anyone who has physical access to the switch can easily gain access to the IOS. While this may not be a big deal in some cases, it could be a serious security issue in others. If you're concerned about unauthorized access to your switch, make sure to set a password for the console.

Learn more here:

https://brainly.com/question/23540634

#SPJ4

A(n) ____________________ is a group of computers controlled by a computer running windows server.

Answers

A window domain is a group of computers controlled by a computer running windows server.

What is a domain for Windows?

A domain is known to be a set of linked  Windows computers that tends to share user account information as well as a security policy.

Note that the domain controller helps to handle the user account information that is set for all domain members. The domain controller tend to boast network administration.

Therefore, A window domain is a group of computers controlled by a computer running windows server.

Learn more about window domain from

https://brainly.com/question/1383829

#SPJ1

patricia has started a new interior design business, and wants to store designs in the cloud so her clients can review them. which of the following apps should she use for cloud storage?

Answers

Based on the above, the apps that  Patricia need to use for cloud storage is called a Drop box.

What is a Dropbox?

The Dropbox is known to be a Software that is said to be a file making work known to be made by the American company.

It has its headquartered to be in U.S. and it is known to be a software that offers a lot of services such as:

A cloud storage, File synchronizationPersonal cloud, A client software.

Note that a cloud storage is known to be a kind of cloud computing model that helps to save data on the Internet via the use of a cloud computing provider who helps to handle and runs the data storage as a form of service.

Therefore, Based on the above, the apps that  Patricia need to she use for cloud storage is called a Drop box.

Learn more about Drop box from

https://brainly.com/question/27327971
#SPJ1

Your isp sent you the following information. default gateway 131.75.69.32/23 what is the proper subnet mask for this ip address (in dotted decimal format)?

Answers

Based on the above, the proper subnet mask for this IP address(in dotted decimal format) is known to be:

255.255.248.011111111.11111111.11111000.00000000

What is the subnet mask for?

A subnet mask is known to be a kind of a 32-bit number that is said to be formed by setting host bits to those of all 0s as well as the setting network bits to all  of the 1s.

Note that based on that, the  subnet mask tends to separates the IP address into what we call the network as well as the host addresses. The “255” address is known to be the one that is often  assigned to a broadcast address.

Therefore, Based on the above, the proper subnet mask for this IP address(in dotted decimal format) is known to be:

255.255.248.011111111.11111111.11111000.00000000

Learn more about subnet mask from

https://brainly.com/question/28256854

#SPJ1

Headers print in the top margin _____ inch from the top of every page. a. one-quarter b. one-half c. three-quarters of a(n) d. one

Answers

Headers print in the top margin one-half inch from the top of every page.

What is Microsoft Word?

Microsoft Word can be defined as a word-processing software application that is designed and developed by Microsoft Inc., so as to avail its end users an ability to type, format, adjust, save and print text-based documents.

In Microsoft Word, headers for text-based documents are designed to print in the top margin one-half inch from the top of every page by default.

Read more on Microsoft Word headers here: https://brainly.com/question/26526086

#SPJ1

freddy wants to take up a few platform-specific courses for his new job. which courses can he take? to be able to perform for programming languages specific to a certain platform, freddy can take courses such as and .

Answers

In order to be able to perform for programming languages specific to a certain platform, Freddy can take courses such as HTML5 and CSS3.

What is CSS 3 ?

CSS 3 is an abbreviation for Cascading Style Sheets revision 3 and it can be defined as a style sheet programming language that is designed and developed for describing and enhancing the presentation of a webpage (document) that is written in a markup language such as:

XMLHTML

What is HTML 5?

HTML 5 is an abbreviation for hypertext markup language revision 5 and it can be defined as a standard programming language which is used for designing, structuring, developing and presenting websites or webpages.

In order to be able to perform several tasks by using programming languages specific to a certain platform, Freddy can take courses such as HTML5 and CSS3.

Read more on HTML 5 here: https://brainly.com/question/28145966

#SPJ1

Complete Question:

Select the correct answer from each drop-down menu. Freddy wants to take up a few platform-specific courses for his new job. Which courses can he take?

To be able to perform for programming languages specific to a certain platform, Freddy can take courses such as and .

first dropdown

a. HTML5

b. Visual C#

c. JavaScript

second dropdown

a. Jquery

b. CSS3

c. .NET

Type the correct answer in the box. Spell all words correctly.

George is creating a professional presentation for his client and wants to add his company’s logo, some images, and a video of his manufacturing unit into a slide. Which parts of the slide layout should he use?

George must use the [ ? ] of the slide layout to insert the company logo, images, and the video into his slide.

Answers

George must use the media of the slide layout to insert the company logo, images, and the video into his slide.

What is a slide?

A slide can be defined as a single page of a presentation that is made up of text-based information or images, which can be used to teach and educate an audience on a subject matter.

What is a slide layout?

In Computer technology, the slide layout feature of a presentation software’s interface such as Microsoft PowerPoint, can be used to insert two or more tables, logo, images, and the video in a slide and format the text on all slides.

In this scenario, George must use the media of the slide layout to insert the company logo, images, and the video into his slide.

Read more on slides here: brainly.com/question/7019369

#SPJ1

How are mobile cameras and digital cameras related to each other?
O They are essentially the same thing the names are used interchangeably.
O They are not related except that they are both cameras.
O Digital cameras are a type of mobile camera.
O Mobile cameras are a type of digital camera.

Answers

Answer:

Mobile cameras are a type of digital camera.

Explanation:

please make my answer as brainelist

A copyright is registered, while a trademark is____

Answers

Answer: Approved

Explanation: Copyright is generated automatically upon the creation of original work, whereas a trademark is established through common use of a mark in the course of business.

Most voice over ip (voip) traffic over the public internet is not encrypted so anyone can listen in on conversations:
a. true
b. false

Answers

Answer:

True

Explanation:

Do you foresee that the traditional computer will be replaced by mobile and smart technologies as a primary device form factor in the near future?

Answers

Yes, i do see that the traditional computer will be replaced by mobile and smart technologies as a primary device form factor in the near future.

How will computers evolve in the future?

The future of computing is known to be one that is said to be shaped by the use of transistors that was said to have been made from materials that are not silicon based.

Note that  It is one that is known to being increased to the highest extent by methods  that have nothing to do with the said transistor speed, such as the use of deep-learning software and others.

Therefore, My response is Yes, i do see that the traditional computer will be replaced by mobile and smart technologies as a primary device form factor in the near future.

Learn more about technologies from

https://brainly.com/question/13044551
#SPJ1

Write a split_check function that returns the amount that each diner must pay to cover the cost of the meal. the function has 4 parameters:

Answers

The function has 4 parameters:

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

  tip = bill * tip_percentage

  tax = bill * tax_percentage

  total = bill + tip + tax  

  return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

Create a function named split check that takes four parameters, bill, persons, tax percentage and tip percentage (last two values are optional) (last two parameters are optional)

Use the percentages to compute the tip and tax inside the function. Add the bill, the tip, and the tax to get the final amount. The cost per person is then calculated by dividing the amount by the number of people.

Learn more about parameters:

https://brainly.com/question/28249912

#SPJ4

Programs remember numbers and other data in the computer's memory and access that data through program elements called?

Answers

Programs remember numbers and other data in the computer's memory and access that data through program elements variables.

What are variables?

A variable is a value that is subject to change based on external factors or data given to the application. A program typically consists of data that it uses while running and instructions that tell the machine what to execute.

Variables are storage units of computer memory. They are of different symbols.

Thus, variables are used by programs to store and access data, including numbers and other types of information.

To learn more about variables, refer to the link:

https://brainly.com/question/20983463

#SPJ1

Modifier __________ reports when an anesthesiologist is medically directing one crna.

Answers

Modifier QY reports when an anesthesiologist is medically directing one CRNA.

What is Anaesthesia?

This refers to the medical process where there is an induced loss of sensation in a body part, usually in preparation for surgery.

Hence, we can see that Modifier QY reports when an anesthesiologist is medically directing one CRNA and this is because it is the medical direction of one qualified nonphysician anesthetist by an anesthesiologist.

Therefore, the use of modifier Q is important as it makes a report when an anesthesiologist is medically directing one CRNA.

Read more about anaesthesia here:

https://brainly.com/question/9918511

#SPJ1

you are the ceo of an isp firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. what kind of a business document will you submit to request vendors to submit a good proposal for your product query?

Answers

The kind of a business document that  you will submit to request vendors to submit a good proposal for your product query is option b:  An RFP.

What is query in SQL?

A query is known to be a term that is said to be a form of request that is made  for data or information which is said to be obtained from a database table or the composition of tables.

The products query is known to be a tool that gives room for a person to be able to search for catalog items.  A Request for Proposal (RFP) is said to be a form of a business document and an Organization do  publish RFPs to ask for proposals from potential vendors for a specific project solution.

Therefore, The kind of a business document that  you will submit to request vendors to submit a good proposal for your product query is option b:  An RFP.

Learn more about product query from

https://brainly.com/question/15705471

#SPJ1

You are the CEO of an ISP firm and you want to replace the existing routers of your clients with the new updated versions which are out in the market. What kind of a business document will you submit to request vendors to submit a good proposal for your product query?

An MSA

An RFP

An MOU

An SOW

the information mis infrastructure supports the day-to-day business operations and plans for multiple choice security breaches and theft. all of the answer choices are correct. malicious internet attacks. floods and earthquakes.

Answers

The information MIS infrastructure supports the day-to-day business operations and plans for: D. All of the above.

What is an information system?

An information system (IS) can be defined as a collection of computer systems and Human Resources (HR) that is used by a business organization or manager to obtain, store, compute, and process data, as well as the dissemination (communication) of information, knowledge, and the distribution of digital products from one location to another.

What is MIS?

In Business management, MIS is an abbreviation for marketing intelligence system and it can be defined as a type of information system (IS)  which is designed and developed to uses both informal and formal information-gathering procedures to obtain strategic information from the marketplace.

In conclusion, the information MIS infrastructure generally supports the daily business operations and plans for:

Security breaches and theft.Floods and earthquakes.Malicious internet attacks.

Read more on marketing intelligence system here: brainly.com/question/14951861

#SPJ1

Complete Question:

The information MIS infrastructure supports the day-to-day business operations and plans for ____________.

A. Security breaches and theft

B. Floods and earthquakes

C. Malicious internet attacks

D. All of the above

The performance variables productivity, absenteeism, and turnover are generally considered a part of the ________ behaviors in the exit-voice-loyalty-neglect framework.

Answers

The performance variables productivity, absenteeism, and turnover are generally considered a part of the exit and neglect behaviors in the exit-voice-loyalty-neglect framework.

What is absenteeism?

Absenteeism may be defined as a type of habitual pattern which involves the complete absence of an individual from a duty or obligation without any probable or good reason.

Exit and neglect behavior is a type of behavior that significantly illustrates the performance of numerous attributes on the basis of the exit-voice-loyalty-neglect framework. It includes exiting the organization, migrating to a distinct department, and provoking the dissatisfied state of affairs.

Therefore, the exit and neglect behaviors in the exit-voice-loyalty-neglect framework includes the performance variables productivity, absenteeism, and turnover.

To learn more about Absenteeism, refer to the link:

https://brainly.com/question/27202509

#SPJ1

while working in a call center, you receive a call from latisha, who says she can no longer access the online reporting application for her weekly reports through her web browser. you ask your manager, and she tells you that the server team changed the application's url during an upgrade over the weekend. she asks you to make sure all the other technicians are aware of this change. what is the best way to share this information?

Answers

The best way to share this information is to: C. update the knowledge base article that contains the software application's URL in the call tracking application.

What is a website?

A website can be defined as a collective name which connote a series of webpages that are interconnected with the same domain name or Uniform Resource Locator (URL), so as to provide certain information to end users.

What is a Uniform Resource Locator?

In Computer technology, a Uniform Resource Locator (URL) can be defined as an Internet address of a website that identifies the method by which an Internet resource (website) should be accessed by end users.

In this scenario, the best way to share this information is to update the knowledge base article that contains the software application's Uniform Resource Locator (URL) within the call tracking application.

Read more on a Uniform Resource Locator here: https://brainly.com/question/14716338

#SPJ1

Complete Question:

While working in a call center, you receive a call from Latisha, who says she can no longer access the online reporting application for her weekly reports through her web browser. you ask your manager, and she tells you that the server team changed the application's URL during an upgrade over the weekend. she asks you to make sure all the other technicians are aware of this change. what is the best way to share this information?

a. Print a flyer with the new URL and post it on the wall in the call center.

b. Send out a mass email with the new URL to all the technicians.

c. Update the knowledge base article that contains the application's URL in the call tracking application.

d. Yell the new URL to all technicians sitting in the call center.

Which description of the plain text file format is most accurate? uses binary code to store data can only be opened with special software supports text formatting like bold or italics used by programmers for source code

Answers

The phrase "uses binary code to store data" is the best way to describe the plain text file format.

A binary code uses a two-symbol system to represent text, computer processor instructions, or any other data. The binary number system's "0" and "1" are frequently used as the two symbols in this system. Each character, instruction, etc. is given a set of binary digits, also referred to as bits, by the binary code.

An eight-bit binary string, for instance, has 256 possible values and can thus represent a wide range of different things. Binary codes are used in computing and telecommunications for a number of different ways to encode data, like character strings, into bit strings. These techniques could make use of fixed-width or flexible strings.

Learn more about binary code https://brainly.com/question/28222245

#SPJ4

Data ________ helps to ensure data integrity by maintaining information in only one place.

Answers

Data  centralization helps to ensure data integrity by maintaining information in only one place.

When data is dispersed and not centralized, it is hard for team members to respond to simple questions. Simultaneously, incompatible and fragmented data will hinder innovation and reduce your organization's competitiveness. It also threatens data integrity.

Point-to-point connections assist businesses in optimizing workflows and automating the use of various online applications concurrently. However, while this method of handling data (from websites, social media platforms, marketing campaigns, and other sources) is efficient, it does not provide the most significance from your data.

To learn more about data centralization: brainly.com/question/17373547

#SPJ4

what happens if i delete system 32 on my pc

Answers

Answer:

Your computer will start collapsing slowly. Many fundamental features such as using Start Menu to open programs and opening Windows programs won’t work.

Explanation:

Answer:

you crash id

Explanation:

Which component of the operating system selects the next process to be executed when the cpu becomes idle?

Answers

The next process to be executed when the CPU becomes idle is CPU scheduling. The foundation of multi-programmed operating systems is CPU scheduling.

The operating system can increase computer productivity by moving the CPU between processes. Multiprogramming is a rather straightforward concept. The operating system must choose one of the processes in the ready queue to be performed whenever the CPU becomes idle. The short-term scheduler handles the selection procedure.

One of the processes in memory that are ready to run is chosen by the scheduler, and that process is given the CPU. The issue of choosing which task in the ready queue should receive the CPU is dealt with by CPU scheduling.

Learn more about CPU scheduling https://brainly.com/question/13107278

#SPJ4

after developing a model, many case tools can generate program code, which impedes and slows down the implementation process.

Answers

The given statement that is after developing a model, many case tools can generate program code, which impedes and slows down the implementation process is false.

In computing, code generation is a step in the compiler's workflow that transforms intermediate representations of source code into forms that can be easily executed by the target system, such machine code. Multiple passes are frequently carried out by sophisticated compilers on various intermediate forms.

To begin writing in code, reverse-write the message you wish to communicate. Add a letter and a number between each letter in your original message after that. Your message will appear to everyone else as a collection of random characters and digits.

Tools that write code for you are called code generators. It's a really cool method for handling repetitious programming issues that can't be resolved by creating an abstraction.

Learn more about program:

https://brainly.com/question/26134656

#SPJ4

question 3. you'll sometimes want to find the last element of an array. suppose an array has 142 elements. what is the index of its last element? (4 points)

Answers

You'll sometimes want to find the last element of an array. suppose an array has 142 elements. The index of the last element is array[141]. Because array index start at zero.

In different programming languages, the syntax is different to get the last element of an array.

For example, in C++, to get the last element of the array, we use the following program to get the last element of the array:

#include <iostream>

#include <array>

using namespace std;

int main()// main function

{

  array<int,142> myArray {1, 2, 3, 4,..., 142};/*suppose array has 142 elements*/

   int lastElementofArray = myArray.back();/*get the last element of the array*/

  cout<<"last element is: "<<lastElementofArray<<endl;/* print the last element of the array*/

  return 0;

}//end of main function.

While in python to get the last element of array, the following program performs this function.

myArray = [1,2,3,4,5,.....,142] /*assume we have 142 element in it*/

last_element = myArray[-1]/*it will get the last element of the array*/

print(last_element)//print the last element in the array.

You can learn more about arrays in python at

https://brainly.com/question/21723680

#SPJ4  

You have just captured data using the socket.recv method into a variable named client_data. what can you use to convert client_data to a string?

Answers

We can see the image below for the code use to transform client_data to a string. The method above is majorly focused on the network buffers. The above code is part of socket programming python.

Two nodes on a network can connect and communicate with one another using socket programming. While the first socket listens on a specific port at an IP address, the other socket reaches out to the first socket to establish a connection. The server generates the listener socket as the client makes contact with it. They essentially lay the groundwork for online browsing. Simply explained, there is a server and a client. The first stages in socket programming are importing the socket library and building a simple socket.

Learn more about socket oriented programming https://brainly.com/question/12972718

#SPJ4

The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n)?

Answers

The series of steps that describe exactly what each portion of a program is supposed to do is known as an Algorithm.

What is algorithm and how it works?

An algorithm is known to be a kind of a coded formula that is said to be written into software and it is one if triggered can make the tech to take some  action to handle a problem.

Note that Computer algorithms work through the use of input and output and as such, The series of steps that describe exactly what each portion of a program is supposed to do is known as an Algorithm.

Learn more about Algorithm from

https://brainly.com/question/15802846
#SPJ1

Which communication technology often takes the place of printed interoffice communication?.

Answers

Answer:

E-mail

Explanation:

Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network. True or false

Answers

Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network is a true statement.

How are LANs connected to each other?

The use of the  peer-to-peer LAN directly is one that tends to link two devices such as workstations or personal computers  as one or  together through the use of an Ethernet cable.

Note that the client-server LAN is made up  of multiple endpoints as well as servers that are linked to a LAN switch.

Therefore, Where ethernet connects lans with each other, internet protocol (ip) connects data between machines that are all on the same network is a true statement.

Learn more about ethernet from

https://brainly.com/question/1637942

#SPJ1

joshua is running a sprint. of the four key items to help make a sprint successful, which key item and tool are used to show progress?

Answers

Of the four key items to help make a Sprint successful, the key item and tool which are used to show progress is: daily Scrum; standup.

What is physical fitness?

Physical fitness can be defined as a measure of both the physical and mental soundness (wellness) or ability of an individual to engage in physical exercises (sprints), sports, work and other day-to-day activities.

Generally, there are four (4) key items that help make a Sprint successful and these include the following:

The sprint planning meeting.The daily scrum.The sprint review meeting.The sprint retrospective.

In conclusion, the daily Scrum and standup are the key item and tool which are used to show progress in a Sprint.

Read more on daily Scrum here: https://brainly.com/question/17199092

#SPJ1

Complete Question:

Joshua is running a Sprint. Of the four key items to help make a Sprint successful, which key item and tool are used to show progress?

Select an answer:

measurement; burndown chart

Daily Scrum; standup

When would you want to take a photo with a large aperture? Select all that apply.

Taking a photo of a field of tulips
Taking a photo of a single bumblebee on a flower
Taking a photo where you want the background to be blurry
Taking a landscape photo were you want everything in focus

Answers

Answer:all  exept taking a photo wher you want the background to be blurry.

Explanation:

A large aperture means that the lens is letting in more light. And when more light is let in, that produces a shallow depth of field. You can use large apertures anytime you want to add dimension to your photos.

hope this helps=]

Other Questions
according to the perspective of , the internalization of societal values in the process of socialization is important because it reinforces social consensus and order. 3. In Harrison Bergeron Describe the director's choice in camera angles, shot selection and lighting. What affect does thishave on the storyline and mood? identify the example of a physical change. please choose the correct answer from the following choices, and then select the submit answer button. answer choices the formation of a yellow solid when two colorless liquids are mixed the formation of bubb stock a, has returns of 10%, 20%, 30%, and 40%, over the last four years. what is the stock's standard deviation? james d.c. factors influencing food choices, dietary intake, and nutrition-related attitudes among african americans: application of a culturally sensitive model. ethn. health. 2004;9:349367. consider a swimmer that swims a complete round-trip lap of a 50 m long pool in 100 seconds. the swimmer's... PLSSS HELP IF YOU TURLY KNOW THISS 9589+5319 simplified using decimal form Hello can somone answer this quickly please ill give brainly Solve.3 The Ramirez family drives 8 hours each day for 3 days.They drive 457 miles the first day, 468 miles thesecond day, and 473 miles the third day. How manymiles each hour do they drive on average for thewhole trip?Show your work. Assume that divisional operating income amounts to $202,000 and top management has established 14 s the minimum return on divisional assets totaling $1,185,000. the residual income for the division is:__________ you have a container filled with 31 moles of neutral lithium. how much negative electric charge is contained in the electrons of all the lithium atoms in the container? Making a business decision based on its projected financial outcome and then arguing that the decision is ethical is:__________ Two friends are playing with water balloons. They each start at the bucket of balloons and walk in opposite directions before tossing their balloons at each other. Joy walked 12 steps forward, and Shaunte walked 8 steps backwards. Which expression correctly represents the distance between the friends? 12 + 8 = 20 steps 12 + |8| = 20 steps |12| + 8 = 20 steps |12| + |8| = 20 steps I'll give brainly. need correct answers only Who was invited to Vienna, the Austrian capital, to meet in the walled city? say whether the lines AB and CD are parallel in the following diagrams, with reasons Consider the composite function g(f(x)) = x6.If f(x) = 3x, what is g(x)?O g(x)=2xO g(x)=x+3O g(x)=6xO g(x)=9-x Particular arrangement of note lengths in a piece of music; the ordered flow of music through time. __________ is a partnership between an organization and a foreign company partner or partners in which both share resources and knowledge in developing new products or building production facilities.