Answer:
A Program was written to carry out some set activities. below is the code program in C++ in the explanation section
Explanation:
Solution
CODE
#include <iostream>
using namespace std;
int main() {
string name; // variables
int number;
cin >> name >> number; // taking user input
while(number != 0)
{
// printing output
cout << "Eating " << number << " " << name << " a day keeps the doctor away." << endl;
// taking user input again
cin >> name >> number;
}
}
Note: Kindly find an attached copy of the compiled program output to this question.
I think the best one is voice recognition keyboards.
Would perfect work there
Mark as brainliest
Answer:
Written in Java
public static void printArray(int myarr[], String s){
for(int i = 0; i<myarr.length;i++){
System.out.print(myarr[i]+s);
}
}
Explanation:
This defines the static method alongside the array and the string variable
public static void printArray(int myarr[], String s){
The following iteration iterates through the elements of the array
for(int i = 0; i<myarr.length;i++){
This line prints each element of the array followed by the string literal
System.out.print(myarr[i]+s);
}
}
The method can be called from main using:
<em>printArray(myarr,s);</em>
Where myarr and s are local variables of the main
Answer:
Threat
Explanation:
In risk management, the hacking group would be considered a Threat. This is because a threat is anything that is able to analyze, find, and take advantage of vulnerabilities of your system. This applies regardless of the intentions of the group. In this case, the hacking group is using various tools to exploit specific existent vulnerabilities in Mary's companies database servers and would therefore classify as a Threat. In risk management, this is serious and is usually a priority that needs to be dealt with.