cpp g Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards, then backwards. End each loop with a newline. Ex: If courseGrades

Answers

Answer 1

Answer:

lol don't ask people to write code for you

assuming its an array, n is size.

normally:

for(int ele: courseGrades){

cout << ele <<" ";

}

cout << endl;

reverse:

reverse(courseGrades, courseGrades + n);

for(int ele: courseGrades){

cout << ele <<" ";

}

cout << endl;


Related Questions

What is the output from the following code? MapInterface m; m = new ArrayListMap(); m.put('D', "dog"); m.put('P', "pig"); m.put('C', "cat"); m.put('P', "pet"); System.out.println(m.get('D')); System.out.println(m.get('E')); System.out.println(m.get('P'));

Answers

Answer: dog

null

pet

Explanation:

taking into condiserations the various animals and their tag given to them;

OUTPUT :

dog

null

pet

PROOF:

Where the Initially map : {}

after map.put('D', "dog"), map : {'D':"dog"}

after map.put('P', "pig"), map : {'D':"dog", 'P':"pig"}

after map.put('C', "cat"), map : {'D':"dog", 'P':"pig", 'C':"cat"}

after map.put('P', "pet"), map : {'D':"dog", 'P':"pet", 'C':"cat"}, what this does is replace the  value of P with "pet"

map.get('D') prints dog.

map.get('E') prints null, key is not present

map.get('P') prints pet

cheers I hope this helped !!

Which security scanner runs in a web browser and doesn't require that you install a product before scanning

Answers

Answer:

It’s OSI. also your question cut off lol

In GamePoints' constructor, assign teamWhales with 500 and teamLions with 500. #include using namespace std; class GamePoints { public: GamePoints(); void Start() const; private: int teamDolphins; int teamLions; }; GamePoints::GamePoints() : /* Your code goes here */ { } void GamePoints::Start() const { cout << "Game started: Dolphins " << teamDolphins << " - " << teamLions << " Lions" << endl; } int main() { GamePoints myGame; myGame.Start(); return 0; }

Answers

Answer:

Here is the GamePoints constructor:

GamePoints::GamePoints() :

/* Your code goes here */

{

teamLions = 500;

teamDolphins = 500;

}    

Explanation:

Here is the complete program:

#include  //to use input output functions

using namespace std; //to identify objects like cin cout

class GamePoints {  //class GamePoints

   public: GamePoints(); // constructor of GamePoints class

   void Start() const;  //method of GamePoints class

   private: //declare data members of GamePoints class

   int teamDolphins; // integer type private member variable of GamePoints

   int teamLions; }; // integer type private member variable of GamePoints

   GamePoints::GamePoints()  //constructor

    { teamLions = (500), teamDolphins= (500); }   //assigns 500 to the data members of teamLions  and teamDolphins of GamePoints class

   void GamePoints::Start() const    { //method Start of classs GamePoints

       cout << "Game started: Dolphins " << teamDolphins << " - " << teamLions << " Lions" << endl; }  //displays the values of teamDolphins and teamLions i.e. 500 assigned by the constructor

       int main() //start of main() function

       { GamePoints myGame;  // creates an object of GamePoints class

       myGame.Start(); //calls Start method of GamePoints class using the object

       return 0; }

The output of the program is:

Game started: Dolphins 500 - 500 Lions                    

Outline a scenario in which you might be acting ethically but might still want to remain anonymous while using the Internet. How might someone learn your identity even if you attempt to remain anonymous?

Answers

Answer:

I would like to stay anonymous while criticizing the current government. As there have been many cases when people who wrote against the government's decisions were caught by the police.

So I would prefer to stay anonymous while commenting on various government policies. My friends would know about it because I share my posts only with them.

The government can know about my identity by ordering the social networking site to reveal it.

One scenario in which you can act ethically but still remain anonymous when using the internet could be to guarantee your freedom of expression on a certain subject, sharing your ideas in the way you think is ideal for the situation.

Is anonymity on the internet legal?

It is protected by the US Supreme Court under the First Amendment, but its protection is balanced, that is, anonymity on the internet can be dissolved and the user can be found if the use of this function occurs to commit cyber crimes.

Therefore, it is essential that every individual action on the internet and outside of it is based on ethics and legality, so that there is an orderly and positive society for all citizens.

Find out more information about cyber crimes here:

https://brainly.com/question/25157310

Select the components of a search engine.
a. robot
b. database
c. search form
d. all of the above

Answers

Answer:

C because whatever a search engine is it will need a search form to do its job, so C (maybe d)

A . There is a boy that traffics around the web and sorts out the result you see on your search engine e.g Google based on the input of the user that is what the user searched for
B. There would be obviously a database where all the results come from

You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of:________

Answers

Complete Question:

You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of?

Group of answer choices

A. Wildcard

B. The Tab key

C. Regular expressions

D. The Escape key

Answer:

B. The Tab key

Explanation:

In this scenario, You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of the Tab key.

When working with the command line prompt (cmd) on a Windows, Unix or Linux computer, typing file paths is sometimes difficult or considered to be a burden because they are lengthy (too long) and perhaps confusing to the user. To help yourself out, you can always use the "Tab key" to autocomplete names of directories or file paths in an alphabetical order, while in the command line.

Additionally, pressing the "Tab key" continuously while in the command line would cycle or toggle all available commands in an alphabetical order.

Give a command that will create a file named listing.dat, in your current (commandsAsst) directory, containing a list of all the files in your fileAsst directory. I need to use redirection, and have tried almost every variation of ls -a < ~/UnixCourse/fileAsst. > listing.dat Primarlily the error I get is that I did not create the 'listing.dat file with ALL of the files located in ../fileAsst/ When I run the same command in another terminal window, then verify with ls -a I can see that I did indeed create the listing.dat file. Can someone tell me what it is I am missing?

Answers

Answer:

Following are the command to this question:

"ls -a ~/UnixCourse/fileAsst > listing.dat"

Explanation:

The above-given code will create a file, that is "listing.dat", and this file will be created in your current directory, which will include the list of all files in the file-asst directory.

In this, Is command is used that uses the directory that is "UnixCourse/fileAsst" and inside this, it will create the "dat" file that is "listing".

What are the advantages and disadvantages of solving a problem that can be broken down into repetitive tasks with recursion as opposed to a loop? Explain your answer.

Answers

Answer:

Answered below

Explanation:

Recursion refers to the process of a function calling itself within its own definition. It calls itself repeatedly until a base condition is met and the loop breaks.

The advantages of recursion over loops include;

A) Recursion reduces time complexity.

B) Recursion is better at tree traversal and graphs.

C) Recursion reduces the time needed to write and debug code and also adds clarity to code.

Disadvantages of recursion include;

A) Recursion uses more memory because each function call remains in stack until the base case is met.

B) Recursion can be slow.

C) Recursion

Which button is used to decrease the contrast for a selected image ?

Answers

Answer:

tab button........... ..

Home communication involves controlling systems such as heating, cooling, and security.
a. True
b. False

Answers

Answer:

A. True

Explanation:

Home communications involves automating home. It includes controlling the air-con,water heater, webcam, etc. A

Assume the following Python code has already executed.
import os
cwd = os.getcwd()
Which answer is most likely output from the following Python statement?
os.path.join(cwd, 'Documents/file.txt')
Select one:
a. ['Music', 'Pictures', 'Desktop', 'Library', 'Documents', 'Downloads']
b. False
c. True
d. /Users/me
e. /Users/me/Documents/file.txt

Answers

e. /Users/me/Documents/file.txt

The Python statement is an illustration of file manipulations

The output from the Python statement is: (e) /Users/me/Documents/file.txt

From the given statement, the first line imports the Python os module.

While the second line gets the current working file path.

So, the statement os.path.join(cwd, 'Documents/file.txt') means that:

The current working file path is Documents/file.txt

Hence, the output from the Python statement is: (e) /Users/me/Documents/file.txt

Read more about file manipulations at:

https://brainly.com/question/19386916

Arrays save space because all elements of an array are stored in a single memory location while a list of variables needs a separate location for each variable.

a. True
b. False

Answers

Answer:

The correct option is A True

Explanation:

Arrays are implemented to store sevaral variables of the same type as a single array object in java for example. The arrays therefore acts as a container that can store several variables of the same type hence preventing the need to declare those variables seperately thus giving more code efficiency and better storage space management.

kyra needs help deciding which colors she should use on her web page. what can she use to help her decide?​

Answers

Answer:

What colors does she like most, and what colors best correlate with the subject of the website.

Explanation:

You want to have the color relate to the subject of the website, or just favorites!

Answer:

Storyboarding.

Should behavioral tracking be legal? Why or why not?

Answers

Answer:

I honestly don't see very many reasons on why it is bad because it's just showing you ads that you might actually want to see instead of some random ad about cats whenever you own a goldfish, but I feel like websites should ask for permission before they do it.

Answer:

     Behavioral Tracking should be legal. I don't see very many reasons as too why behavioral tracking is bad being shown as ads that might actually be useful, but websites should ask for permission before they do it.

Which advantage of database processing makes it easier to make a change in the database structure?

Answers

Answer:

I HOPE IT WORK

Explanation:

An advantage of using the database approach to processing is that it facilitates consistency. True. Users never interact with a database, directly; database interaction is always through the DBMS

what keyboard command that will allow you to copy text

Answers

Answer:

Control + c

Explanation:

If you click and drag over text to highlight it and press on the control or command key (CTRL) and the "C" key, it will copy the text. When you want to paste it, you press control or command key (CRTL) and key "V" at the same time.

Given two strings s and t of equal length, the Hamming distance between s and t, denoted dH(s,t), is the number of corresponding symbols that differ in s and t.
Given: Two DNA strings s and t of equal length (not exceeding 1 kbp).
Return: The Hamming distance dH(s,t).
Sample Dataset
GAGCCTACTAACGGGAT CATCGTAATGACGGCCT
Sample Output
7

Answers

Answer:

computer and technologycomputer and technology

Explanation:

computer and technologycomputer and technology

"The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works."

Answers

Answer:

decision logic

Explanation:. The decision logic of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works. These systems includes the following :

a) Order processing,

b)Pricing

c) Inventory control, and

d) Customer relationship management. And the traditional means of modifying the decision logic of information systems involves heavy interaction between business users and information technology (IT) analysts.

Which of the following are characteristics of algorithms? Choose all that apply. They take a step-by-step approach to performing a task. They’re made up of Instructions posted on a website. They break the task into manageable steps. They identify the tasks that will repeat. They can be written in a computer language to create a program for a computer to follow.


Answer: They take a step-by-step approach to performing a task.
They break the task into manageable steps.
They identify the tasks that will repeat.
They can be written in a computer language to create a program for a computer to follow.

Answers

Answer:

They take a step-by-step approach to performing a task.

They break the task into manageable steps.

They identify the tasks that will repeat.

They can be written in a computer language to create a program for a computer to follow.

Explanation:

An algorithm is a step by step process that needs to be followed in order to solve logical, mathematical, well-defined instructions.

An everyday example of an algorithm is a recipe because it gives you steps to do in order to complete a task.

In computing terms, algorithms can be represented with flow charts, pseudocodes, or high-level languages.

Some of its characteristics include:

They can be written in a computer language to create a program for a computer to follow.They identify the tasks that will repeat. They take a step-by-step approach to performing a task. They break the task into manageable steps.

Answer:

So your answer will be

A.

C.

D.

E.

Explanation:

Edge2021

Would two bits be enough to assign a unique binary number to each vowel in the English language? Explain.

Answers

Answer:

No.

Explanation:

Since there are 5 vowels, you'd need at least 3 bits to number them. 2 bits give you 2²=4 possibilities, which is 1 short. 3 bits give you 2³=8 possibilities, which fits 5 easily.

The term "bit" means binary digit, and it is used to represent data in a computer system.  

The number of character an n-bit computer can hold is [tex]2^n[/tex]

So, a 2-bit computer can hold a maximum of:

[tex]Max = 2^2[/tex]

[tex]Max = 4[/tex]

i.e. A 2-bit computer can hold a maximum of 4 characters.

The English language vowel are 5 (i.e. letters a, e, i, o and u).

5 is greater than the maximum number of characters the 2-bit computer can hold (i.e. 5 > 4)

Hence, two bits will not be enough to hold each vowel in the English language.

Read more about binary digits at:

brainly.com/question/9480337

"the time it takes a storage device to locate stored data and make it available for processing is called"

Answers

Answer:

The time is called "Access time"

Explanation:

Basically it is the time taken to retrieve information/data

What is access time?

It is the time taken by a storage device to located information and process the information often times the access time is faster in hard drives when compared to other drives like Optical drives.

Another good analogy or description of access time is the time taken to order a product online and when it is delivered to you in your house

 

Which statement correctly creates a set named colors that contains the 7 colors in a rainbow?
a. colors = ["red", "orange", "yellow" "green", "blue", "indigo", "violet"]
b. colors = {red, orange, yellow, green, blue, indigo, violet}
c. colors = [red, orange, yellow, green, blue, indigo, violet]
d. colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}

Answers

Answer:  d. colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}

Explanation:

We use "{}" to write a set in it.

Also, the names of the colors are strings so we use inverted commas ("") to express them.

So, the set named colors that contains the 7 colors in a rainbow will be:

colors = {"red", "orange", "yellow", "green", "blue", "indigo", "violet"}

Hence, the correct option is d.

The following are types of numbers except one. Select the one which is not an integer.
A. Float
B. Int
C. Long
D. Boolean

Answers

Answer:

D) Boolean

Explanation:

Int, Float, Long and Boolean are commonly used data types in programming languages. Of these data types, the Boolean data type, named after George Boole, does not represent a numerical value. Rather it has one of two possible values, True and False. These values represent the two truth values of logic and Boolean algebra.

The Boolean data type is basically associated with conditional statements which specifies different actions to be taken depending on whether the Boolean condition evaluates to true or false. Therefore it influences the control flow of a program.

Which of the following code segments will display all of the lines in the file object named infile, assuming that it has successfully been opened for reading?
a. while line in infile :
print(line)
b. while infile in line :
print(line)
c.for infile in line :
print(line)
d. for line in infile :
print(line)

Answers

Answer:

d.

for line in infile :

   print(line)

Explanation:

for loop is used to iterate through the each line of the file using line variable. The file is accessed using the object infile. For example if the file name is "file.txt" and it is opened in read mode. It contains the following lines:

hi there friend

how are you

what are you doing

Then the above given chunk of code gives the following output

hi there friend

how are you

what are you doing

At each iteration each line of the the file is printed on the output screen. The print() method is used to display these lines in output.

5.4.2: While loop: Print 1 to N. Write a while loop that prints from 1 to user_num, increasing by 1 each time. Sample output with input: 4 1 2 3 4

Answers

Answer:

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   Scanner in = new Scanner(System.in);

   System.out.println("Enter a number");

   int user_num = in.nextInt();

   int n = 1;

   while(n <= user_num){

     System.out.print(n+" ");

     n++;

   }

 }

}

Explanation:

Import Scanner to receive user numberCreate and initalize a new variable (n) to be printed outSet the while condition to while(n <= user_num)Print the value of n after each iteration and increment n by 1

Answer:

Written in Python:

i = 1

user_num = int(input()) # Assume positive

while i <= user_num:

   print(i)

   i += 1

Explanation:

Which class of IP address allows for the greatest amount of subnets and host devices?

a. Class A
b. Class B
c. Class C
d. Class D

Answers

Answer:

A

Explanation:

If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can''t steal user''s information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.

Answers

Answer:

No, hackers can steal information from cookies. This many times depend on the type of cookies.

Cookies, by general definition, are programs embedded onto browsers which collect non-invasive information about our activities such so that it can adapt to our needs.

The type of information that a cookie collects depends on what type of cookie it is.

Session Cookies: These types of cookies only collect information about the movement of the user on the website such as pages visited, products that were examined (for e-commerce websites) and products/services that the user put in their cart.

These type of cookies are temporary and are deleted as soon as the browser is shut down.

Persistent Cookies:

These do the same thing that the Session cookies do only that they are more permanent and are stored in a text file even after the browser and the computer has been shut down.

It is these types of cookies that pose a threat. These type of cookies many store codes and passwords and log-in details which may be exploited by a hacker.

Cheers!

Where can you submit a bug report?​

Answers

Answer:

most developers incorporate a report a bug feature, if you cannot find it search online or go to the website on the software.

Explanation:

When enabling IPsec mobile client support, you made some selections in the Xauth section of the interface. What does Xauth stand for

Answers

Answer:

Extended authentication

Explanation:

Xauth = Extended authentication

An extended authentication can cause security to be increased because it requires the user to enter a username and password. These details would then be authenticated at the internal database of the controller. This extension is an ipsec extension which would enable VPN users to enter a username and password. These details would be required of the user while trying to connect and they would be checked against the login details registered by such a user.

Which of the following terms means that the system changes based on
the needs of each learner?
A
Adaptive
B
Mobile-ready
С
Gamified
D
Reactive

Answers

Answer:

A

Explanation:

Other Questions
Taylor Company issued $100,000 of 13% bonds on January 1, 2019. The bonds pay interest semiannually on June 30 and December 31 and are due December 31, 2021.1. Assume the company sells the bonds for $102,458.71 to yield 12%. Prepare the journal entries to record the sale of the bonds and each 2019 semiannual interest payment and premium amortization, using the effective interest method.2. Assume the company sells the bonds for $97,616.71 to yield 14%. Prepare the journal entries to record the sale of the bonds and each 2019 semiannual interest payment and discount amortization, using the effective interest method. Factoring for GCF. Help please and thanks! If M is the midpoint of segment AB and AM=9x-5 and MB=15-x, what is the length of AB? Find the value of ab when a=4/7 and b= 4/11 Order the set {4 2/3,6,-2,-2 1/2}from greatest to least. You want to have $47,000 in your savings account 9 years from now, and you're prepared to make equal annual deposits into the account at the end of each year. If the account pays 7.1 percent interest, what amount must you deposit each year? Please answer quickly i need to know the measurements of this to the appropriate amount of significant figures The manager of Gilbert Company used the production cost report to compare budgeted costs to actual costs and then based bonuses on the results. This is an example of using the reports to A firm produces its products by a continuous process involving three production departments, 1 through 3. Present entries to record the following selected transactions related to production during August:(a) Materials purchased on account, $120,000.(b) Material requisitioned for Use in Department 1, $125, 700, of which $124, 200 entered directly into the product(c) Labor cost incurred in Department 1, $195, 400, of which $174,000 was used directly in the manufacture of the product(d) Factory overhead costs for Department 1 incurred on account, $54, 700(e) Depreciation on machinery in Department 1, $29, 200(f) Expiration of prepaid insurance chargeable to Department 1, $7,000(g) Factory overhead applied to production in Department 1, $106, 300(h) Output of Department 1 transferred to Department 2, $362, 700 In a step-by-step manner, explain how the voltage-regulated channels produce an Action Potential? Kelly is driving a car with a mass of 800 kilograms in a south direction with a speed of 18 meters/second. Dominic is driving a truck with a mass of 1500 kilograms with a velocity of 15 meters/second to the east. They undergo perfectly inelastic collision. What is the magnitude of the final momentum of both the truck and the car. I dont get this at all :( what was king George and the British military trying to prove to the Americans when they attempted to arrest Adams and Hancock This is the 18th century trade between Africa, the Americas, and Europe. Man-made goods, farm goods, and slaves were exchanged between these three points. What happened in class the day of Mr. Landaus bitter taste test? Liar & Spy Standards and Skills Questions (Without Text Selections)Identify the choice that best answers the question.Which sentence contains an adjective clause?OA. We are going to Glenview Mall this afternoon.aB. It has a new store that sells superhero and manga comics.C. Although we have other errands, we will spend at least 30 minutes there.OD. Whenever you leave is fine with me. Express the final equation in standard form. Contains the point (-8, 5) and is parallel to the line x 3y = 6 You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of:________ Which is better according to Thomas Jefferson? Giving thegovernment more energy or giving education to the people?Explain.