What is printed when you run this code?
int n{};
int *p = &n;
*p = 10;
n = 20;
cout << *p << endl;

Answers

Answer 1

When you run the given code, the output printed would beere's an explanation of the codeint n{}; initializes an integer variable n with the value 0 using the uniform initialization syntax.int *p = &n; declares a pointer variable p of type int* and assigns the address of n to p.

This makes p point to the memory location of n.*p = 10; dereferences the pointer p and assigns the value 10 to the memory location it points to, which is n. So n now becomes 10.n = 20; assigns the value 20 directly to the variable n.cout << *p << endl; prints the value stored at the memory location pointed by p, which is now 20, on the console. Hence, the output will be 20.

To learn more about initializes   click on the link below:

brainly.com/question/15279441

#SPJ11


Related Questions

What is the new subnet mask in prefix format?

Answers

In the case above, the the new subnet mask in prefix format is seen in IPv6 and in IPv4.

What is subnet prefix mask?

A lot or a single computer that is known to be linked to a subnet is said to shares a kind of an identical part of the IP address.

Note that this shared information is said to be called the  routing prefix, and in IPV4 (Internet Protocol Version 4), the routing prefix is said to be called a subnet mask.

Hence, The the new subnet mask in prefix format is seen in IPv6 and in IPv4 because that is the format that it always comes in.

Learn more about subnet from

https://brainly.com/question/8907973

#SPJ1

What is the digital foot print?

Answers

Answer:

Digital footprint (or digital shadow) refers to a person's unique set of traceable digital activities, actions, contributions and communications manifested on the Internet or digital devices.

Hope this helps.

Answer: A digital footprint is an impact you create on the Web through your online activity, which incorporates browsing, interactions with others, and publication of content. In other words, it can be considered as the data trail – intentional and unintentional - you leave behind while you surf the Web or Internet.

What is the confirmation or validation of an event or object? multiple choice business intelligence data fact descriptive analytics

Answers

Fact is the confirmation or the validation of an event or object.

What do we mean by a fact?

A fact is known to be a form of an indisputable observation in regards to a natural or social scenario.

The definition of the term fact is known to be anything that is regarded as true or that thing that has taken place or has been proven to be right. An example of a fact is the popular notion that the world is round.

Note that a person can see it straightforward and show it to others, hence, Fact is the confirmation or validation of an event or object.

Learn more about Fact from

https://brainly.com/question/25465770

#SPJ1

Weak passwords are a(n) ___________ threat

Answers

Answer: Employee

Explanation:

You have configured your Active Directory environment with multiple sites and have placed the appropriate resources in each of the sites. You are now trying to choose a protocol for the transfer of replication information between two sites. The connection between the two sites has the following characteristics:

Answers

In the above case, the protocol that  meets these requirements is SMTP .

What is SMTP?

SMTP or Simple Mail Transfer Protocol is known to be a kind of an application that is needed or that is often used to send, receive, and pass outgoing emails and this exist between senders and receivers.

Hence, in the above case,  the protocol that  meets these requirements is SMTP.

See the full question below

The link is generally unavailable during certain parts of the day because of an unreliable network provider. The replication transmission must be attempted whether the link is available or not. If the link was unavailable during a scheduled replication, the information should automatically be received after the link becomes available again. Replication traffic must be able to travel over a standard Internet connection. Which of the following protocols meets these requirements? A. IP B. SMTP C. RPC D. DHCP

Learn more about SMTP from

https://brainly.com/question/14396938

#SPJ1

The ___ method takes a callback function as an argument and returns the first element in an array for which the callback function returns true.

Answers

Answer:

Find

Explanation:

The find method takes a callback function as an argument and returns the first element in an array for which the callback function returns true.

Application software can be categorized as either general-purpose, specialized, or ________ apps.

Answers

Application software can be categorized as either general-purpose or mobile apps.

What are mobile apps?

Mobile apps can be defined as specialized applications developed to be used in cellphone devices.

Mobile apps are widely used and may help with diverse types of daily tasks and human activities.

In conclusion, application software can be categorized as either general-purpose or mobile apps.

Learn more about mobile apps here:

https://brainly.com/question/26264955

#SPJ1

Define a function GetVolume() that takes one integer parameter passed by reference as totalCups and two integer parameters as gallons and cups. If both gallons and cups are non-negative, the function computes totalCups and returns true. Otherwise, the function returns false without updating totalCups.

Answers

The computer program that takes one integer parameter is illustrated below.

What is a computer program?

A computer program is a set of instructions in a programming language for a computer to execute. A computer program in its human-readable form is called source code.

The program is illustrated below:

#include<iostream>

using namespace std;

void ConvertVolume(int totalTablespoons, int &cups, int &tablespoons) {

   // compute the cups and tablespoons

   // as they are passed by reference,

   // the change will also reflect in the main function

   cups = totalTablespoons / 16;

   tablespoons = totalTablespoons % 16;

}

int main() {

   int usrCups;

   int usrTablespoons;

   int totalTablespoons;

   

   // user input

   cin>>totalTablespoons;

   

   // call the function

   ConvertVolume(totalTablespoons, usrCups, usrTablespoons);

   

   // print the output

   cout<<usrCups<<" cups and "<<usrTablespoons<<" tablespoons"<<endl;

   

   return 0;

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is stored in I_CUST_ID. Place these values in the variables I_CUSTOMER_NAME and I_CREDIT_LIMIT, respectively. When the procedure is called it should output the contents of I_CUSTOMER_NAME and I_CREDIT_LIMIT.

Answers

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

What is SQL?

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

https://brainly.com/question/25694408

#SPJ1

AAA DRIVER'S ED has anyone done this before??? and they know the answer?? bc its not working

Answers

The correct sequence for the driver's ED test is:

Check gaugeStart engineRelease keyCheck lightsLet engine idleCheck if gear is in parkCheck parking brakeFoot on brake pedal

What is a Driving Test?

This refers to the official test of how competent a driver is to ride on the highway and must be passed in order to get a driving license.

Hence, we can see that when taking a driver's test, you would be tested on your knowledge of starting a car, checking the gauges and parking brakes, and the correct sequence of doing it.

Read more about driving test here:

https://brainly.com/question/2666433

#SPJ1

Answer: Mine was not working either, it said it was wrong even though i did it correctly, here is the proper sequences:

Explanation:

How can you reduce the likelihood of wps brute-force attacks?

Answers

One can reduce the likelihood of wps brute-force attacks if they Implement lockout periods for incorrect attempts.

What is a Brute Force Attack?

This refers to the type of hacking that is done when a system or algorithm tries out multiple password combinations and sequences until it gets the right one.

Hence, we can see that based on the vulnerability of the WPS system to a brute force attack, it is recommended that there is the implementation of lockout periods for incorrect attempts.

Read more about brute force attacks here:

https://brainly.com/question/17277433

#SPJ1

What do we call a blinking indicator that shows you where your next action will happen?

Answers

Answer:

cursor

Explanation:

Jared tends to display his weaknesses and downplay his positive characteristics. With whom is he is likely to prefer to spend time

Answers

In the case above, Jared  is likely to prefer to spend time with his friends.

What is the meaning of association?

The Definition of the term association is known to be the act of being with other people.

People often associate with others due to one thing all the other. life exist only as a result of the relationship we have. it can be association base on friendship, love, family, business, and others.

Note that in the case above, because Jared wants to be with his friends, he tends to show only his weakness and as such, In the case above, Jared  is likely to prefer to spend time with his friends.

Learn more about weaknesses from

https://brainly.com/question/19189410

#SPJ1

Which tool can your organization use to remotely wipe a lost mobile phone when byod has been implemented in the enterprise?

Answers

Remote Wipe is  a tool that can your organization use to remotely wipe a lost mobile phone when byod has been implemented in the enterprise.

What Is a Remote Wipe?

It is known to be a tool that can  used to erase data on a device that is known to be lost or stolen so that if the device is seen in the hands of  the wrong hands, the data in it cannot be compromised.

Note the term remote wipe is seen as a kind of a security feature that gives room for a network administrator or the owner of any given device to send a command that will act to remove or deletes data that is in a computing device.

Note that it is a tool that It is primarily used to remove data on a device that has been lost or stolen and thus Remote Wipe is  a tool that can your organization use to remotely wipe a lost mobile phone when byod has been implemented in the enterprise.

Learn more about Remote Wipe from

https://brainly.com/question/14290857

#SPJ1

What three values must be added to the ipv4 properties of a nic in order for a computer to have basic connectivity with the network? (choose three. )

Answers

1. The IP address

2. Subnet mask

3. Default gateway address

It’s values should be added to the NIC properties in order for the computer to have basic network connectivity. This can be done either statically or dynamically with DHCP. An additional value that should be present if the computer is to be used to connect to the Internet is the DNS server value. A computer automatically attempts to locate a DHCP server if configured to do so. A DHCP server address is not used. Finally, NAT is configured on a router, not on a computer host, and speed and duplex settings are NIC hardware settings and not IPv4 properties of the NIC.

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.

Answers

In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

What is a person in the middle attack?

A man-in-the-middle (MiTM) attack is  known to be a form of a type of cyber attack where the attacker is known to often and secretly intercepts and pass messages that occurs between two parties who think they are communicating directly with one another.

Hence, In the case above, the type of hacking attack is Amber perpetrating is option b. A man-in-the-middle attack.

Se full question below

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key.

Which type of hacking attack is Amber perpetrating?

a. A denial-of-service attack

b. A man-in-the-middle attack

c. A drive-by attack

d. A malware attack

Learn more about hacking attack from

https://brainly.com/question/7065536

#SPJ1

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities? unit 9 quiz

Answers

The  procedure should you conduct to make recommendations for the upgrade priorities is posture assessment.

What is Posture assessment?

Postural assessment is known to be one that contains the observation of stable posture so as to get an alignment and visual assessment of paired anatomic traits in terms of symmetry.

Hence, the  procedure should you conduct to make recommendations for the upgrade priorities is posture assessment.

Learn more about posture assessment from

https://brainly.com/question/14328111

#SPJ1

While working on a Windows workstation, you've enabled Remote Desktop.
Which of the following ports MUST be opened in the server's firewall to allow remote clients to access the desktop?
a) 3389
b) 389
c) 110
d) 123

Answers

The ports that  MUST be opened in the server's firewall to allow remote clients to access the desktop is 3389,

What is the port of a computer?

A port in computer hardware is known to be a form of a jack or socket that is said to be used when a piece of software is known to be translated or converted to  be used or run on another hardware or operating system (OS).

Note that The ports that  MUST be opened in the server's firewall to allow remote clients to access the desktop is 3389.

Learn more about ports from

https://brainly.com/question/18133590

#SPJ1

China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks into China's power grid and causes blackouts throughout the provinces. This exemplifies how the United States __________.

Answers

In the case above, it exemplifies how the United States can be both victim and perpetrator of cyberattacks.

What are cyberattacks?

A cyber attack is known to be a form of an online assault that is said to be launched by a lot of cybercriminals through the use of one or more computers against a single or a lot of computers or networks.

Note that In the case above, it exemplifies how the United States can be both victim and perpetrator of cyberattacks as it is an online assault.

See options below

a. establishes military superiority

b. can be both victim and perpetrator of cyberattacks

c. places a low priority on cyberattack protection

d. has nothing to fear from cyberattacks

Learn more about computer virus from

https://brainly.com/question/26128220

#SPJ1

Consider the following method. public boolean checkIndexes(double[][] data, int row, int col) { int numRows

Answers

The  variable declaration and initialization, that  appears in a method in the same class as checkIndexes is checkIndexes(table, 4, 5).

What is declaration of a variable?

Declaration of a variable is known to be a function or work that is seen in computer programming language.

This is known to be a form of a statement that is known to be often used to state or specify the variable in regards to its name and that of its data type.

Note that the Declaration is known to be one that informs the compiler about the presence of an entity in that  program and where one can find it.

Hence, The  variable declaration and initialization, that  appears in a method in the same class as checkIndexes is checkIndexes(table, 4, 5).

See full question below

Consider the following method.

public boolean checkIndexes(double[][] data, int row, int col)

{

int numRows = data.length;

if (row < numRows)

{

int numCols = data[0].length;

return col < numCols;

}

else

{

return false;

}

}

Consider the following variable declaration and initialization, which appears in a method in the same class as checkIndexes.

double[][] table = new double[5][6];

Which of the following method calls returns a value of true ?

A  checkIndexes(table, 4, 5)

B checkIndexes(table, 4, 6)

C checkIndexes(table, 5, 4)

D checkIndexes(table, 5, 6)

E checkIndexes(table, 6, 5)

Learn more about public boolean  from

https://brainly.com/question/14845280

#SPJ1

When an event takes place, the control responsible for the event creates an event?

Answers

Answer: Firing

Explanation:

application of ict in education

Answers

Explanation:

An advantage is that you can be more interactive with students. Teachers can further engage their students with things like quizzes. A disadvantage is you can get information almost instantly which may leave children questioning why they go to school, causing resultant dropouts. This also may make it easier to cheat on examinations which teachers don't want.

What would happen to the glomerular filtration rate (gfr) if a person suffered from severe malnutrition?

Answers

Answer: Children and adults with malnutrition have been shown to have a decreased glomerular filtration rate and renal plasma flow (RPF), as well as a lowered capacity to concentrate the urine and excrete an acid load.

Explanation:

Using above information, Write a prolog program to answer the following queries. Please note that you cannot simply answer these queries with only facts, you should answer then using facts and rules

Answers

Using the computational knowledge in python it is possible to write a code that uses the functions to make a  a prolog program to answer the following queries

Writting the code in python:

valid([]).

valid([Head|Tail]) :-

fd_all_different(Head),

valid(Tail).

sudoku(Puzzle, Solution) :-

Solution = Puzzle,

Puzzle = [S11, S12, S13, S14,

S21, S22, S23, S24,

S31, S32, S33, S34,

S41, S42, S43, S44],

fd_domain(Solution, 1, 4),

Row1 = [S11, S12, S13, S14],

Row2 = [S21, S22, S23, S24],

Row3 = [S31, S32, S33, S34],

Row4 = [S41, S42, S43, S44],

Col1 = [S11, S21, S31, S41],

Col2 = [S12, S22, S32, S42],

Col3 = [S13, S23, S33, S43],

Col4 = [S14, S24, S34, S44],

Square1 = [S11, S12, S21, S22],

Square2 = [S13, S14, S23, S24],

Square3 = [S31, S32, S41, S42],

Square4 = [S33, S34, S43, S44],

valid([Row1, Row2, Row3, Row4,

Col1, Col2, Col3, Col4,

Square1, Square2, Square3, Square4]).

| ?- sudoku([_, 4, 3, 2,

3, _, _, _,

4, 1, _, _,

_, _, 4, 1],

Solution).

Solution = [1,4,3,2,3,2,1,4,4,1,2,3,2,3,4,1]

yes

See more about python at brainly.com/question/18502436

#SPJ1

Steve wants to insert the copyright information in the webpages for the images used in the website. where would you recommend him to place this information?

Answers

I would recommend to Steve that he should insert or place the copyright information for the images used in the website in between the <footer>.....</footer>.

What is a website?

A website can be defined as a collective name which connotes a series of webpages that are interconnected or linked together with the same domain name, so as to provide certain information to end users.

What is a webpage?

A webpage can be defined as a hypertext document within a website and it usually has a unique uniform resource locator (URL).

In this scenario, I would recommend to Steve that he should insert or place the copyright information for the images used in the website in between the <footer>.....</footer> because they would appear underneath each of the webpages.

Read more on website here: https://brainly.com/question/26324021

#SPJ1

You have been asked to configure a client-side virtualization solution with three guest oss. Each one needs internet access. How should you configure the solution in the most cost-effective way?

Answers

The most cost-effective way to configure a client-side virtualization solution is by using one (1) physical NIC, three (3) virtual NICs, and one (1) virtual switch.

What is virtualization?

Virtualization refers to the creation of an abstraction layer over computer hardware through the use of a software, in order to enable the operating system (OS), storage device, server, etc., to be used by end users.

In this scenario, the most cost-effective way to configure a client-side virtualization solution is by using one (1) physical network interface card (NIC), three (3) virtual network interface cards (NICs), and one (1) virtual switch.

Read more on virtualization here: https://brainly.com/question/14229248

#SPJ1

What two advantages does a dataraptor turbo extract have over a standard dataraptor extract?

Answers

The two advantages of dataraptor turbo extract that it have over a standard dataraptor extract are:

It is known to have Simpler configuration.It is known to also have a better performance at runtime.

What is data Raptor?

A DataRaptor is known to be a kind of a mapping tool that helps a person to be able to read, change, and write Salesforce data.

Hence, The two advantages of dataraptor turbo extract that it have over a standard dataraptor extract are:

It is known to have Simpler configuration.It is known to also have a better performance at runtime.

Learn more about DataRaptor from

https://brainly.com/question/2596411

#SPJ1

How can you ensure that your internet search is happening over a secure network connection?.

Answers

A person can you ensure that your internet search is happening over a secure network connection by the use of:

By Renaming your Routers and Networks.The use of a strong passwords.Do Turn on encryption.The use of multiple firewalls.

What is secure network connection?

A secure connection is known to be a kind of a connection that is known to be one that is often encrypted by the use of a single or a lot of security protocols to make sure that the security of data that is known to be passing between two or more nodes.

Therefore, based on the above scenario,  A person can you ensure that your internet search is happening over a secure network connection by the use of:

By Renaming your Routers and Networks.The use of a strong passwords.Do Turn on encryption.The use of multiple firewalls.

Learn more about internet search from

https://brainly.com/question/20850124

#SPJ1

A network designer wants to run a 10 gigabit backbone between two switches in buildings that are 75 m (246 feet) apart. What is the main consideration when selecting an appropriate copper cable?

Answers

The main consideration when selecting an appropriate copper cable is that:

At that given distance, one can use some kinds of shielded or screened cat 6A or one can use a cable which is said to be needed for the installation to be in line with Ethernet standard 10GBASE-T.

What are the types of copper cables?

Copper cable are known to often electrical signals to transmit data between some or a given  networks.

Note that there are three types of copper cable which are:

coaxial, unshielded twisted pair shielded twisted pair.

Copper is said to be a kind of electrical conductor in a lot of categories of electrical wiring and so The main consideration when selecting an appropriate copper cable is that:

At that given distance, one can use some kinds of shielded or screened cat 6A or one can use a cable which is said to be needed for the installation to be in line with Ethernet standard 10GBASE-T.

Learn more about gigabit from

https://brainly.com/question/14312073

#SPJ1

4.8% complete this is a single choice question; skip ahead to question content a b c d confirm difficulty level: moderate an intruder monitors an admin's unsecure connection to a server and finds some required data, like a cookie file, that legitimately establishes a session with a web server. what type of attack can the intruder perform with the cookie file?

Answers

Answer:

A replay attack

Other Questions
find the slope of this line Sam buys a franchise from Taco Loco Inc. This relationship, like all other franchise relationships, is governed by Group of answer choices the federal Franchise Rule. contract law. applicable state law. all of the choices. Read about recycled water here Apply Social Contract TheoryA ruthless Leviathan has assumed power in your nation, and he has issued many stern rules to ensure peace and prosperity. The punishment for breaking one of these rules is long imprisonment or death. Unfortunately, you may have to break a rule against lying to public officials, because telling the truth would condemn a friend of yours to lifelong imprisonment for a crime you know he did not commit. Should you lie? Part C List three ways in which the two documents are similar. When my dog, Dover, plays dead, I reward him with a treat in order to encourage him to repeat the behavior. Why is it important to bracket metaphorical and proverbial language? Select the correct answer. Which function has a domain of all real numbers? y = -x + 5 y = -2(3x) O A. B. OC. y = CD. y = (x + 2) (2x) (2x) - 7 What two activities relate to the "evaluation" aspect of critical thinking? estimating the severity of a problem breaking down the problem into parts finding the source of the problem determining the time needed to solve the problem generating alternatives to solve the problem Which of the following statements is correct? Select one: a. Globalization is a force that causes nations to become more independent of each other. b. All countries and economies benefit equally from globalization. c. Globalization has little to do with international trade. d. Globalization is interaction between nations and economies. Dan & Alex measure themselves against a tree in their backyard. The tree is 80% taller than Dan and 20% taller than Alex. Which of the following statements is true? A. Alex is 50% taller than Dan.B. Dan is 60% taller than Alex.C. Dan is 40% taller than Alex.D. Alex is 40% taller than Dan. Determine the number of terms in the sequence: 45, 32, 19, 6, ..., 124. Solve kx-2=7 for x. A. x=5/k B. x=9k C. x=9-k D. x=9/k How did early christians come into contact with roman authorities? You are building a ramp for your grandparents house. The ramp will replace the steps that go to their front door which is 3 feet off the ground. You want the ramp to start 10 ft from the front door. How long will the ramp need to be? Explain how a disease could cause an effect on the overall function of an organ system by describing a specific example and identify a technology that has been developed to replace the lost cellular function.plssss help A sculpture is formed from a square-based pyramid resting on a cuboid. The base of the cuboid and the base of the pyramid are both squares of side 3 cm. The height of the cuboid is 8 cm and the total height of the sculpture is 15 cm. The total mass of the sculpture is 738 g. The cuboid-part of the sculpture is made of iron with density 7.8 g/cm. The pyramid is made from copper. Calculate the density, in g/cm, of the copper. Madison is strong in executive function, strategic thinking, knowledge acquisition, and cognitive self-regulation. According to Sternberg's triarchic theory, Madison is high in ________ intelligence. In pricing a property, what might expired listings tell the real estate professional? Determine the (x, y) coordinates of the vertex of the parabola that represents each of the following functions: