Given the following code segment, what is output after "result = "? int x = 1, y = 2, z = 3; cout << "result = " << (x < y ? y : x) << endl;a. 1
b. 2
c. 3
d. 4

Answers

Answer 1
Answer:

Answer:

b. 2

Explanation:


Related Questions

What are some methods of cyber bullying ?
___ defines a series of standards for encoding audio and video in digital form for storage or transmission. Most of these standards include compression, often lossy compression.a) JPEG b) ANSI c) ISO d) MPEG
Which statement is written correctly?
Which tool, Wireshark or NetWitness, provides information about the wireless antenna strength during a captured transmission?
Which of these is outside the scope of an art director's responsibility?

The italic button is located on the

Answers

It is located on Mini Tool Bar 

Many organizations have policies that require users to: a. retain their passwords for a minimum of 30 days. b. include at least three consecutive letters of part of their name in their passwords. c. change their passwords on a regular basis. d. share their passwords with the administrator.

Answers

Answer:

Explanation:

Answer is C. Change their passwords on a regular basis.

.Although SQL is a language, you donât use it to write applications? (true, false)

Answers

Answer:

True

Explanation:

SQL stands for structured  query language , which is used to query Relational Database Management systems like SQLServer. This is not for writing applications like business layer where we use some programming languages.SQL is meant for data layer to perform CRUD operations against database.

CRUD operations :

Create

Read

Update

Delete

we can perform above operations on database by using SQL query language

Which best describes what online reading tools aim to help readers do? *100 POINTS*

Answers

Answer:

Read faster

Explanation:

Technology inspires learners to learn as well. They keep trying to figure time to discover and learn stuff from blogs , videos, applications, and games on their computers. At the very same time, kids will understand and have pleasure, which lets them keep involved with the subject.

Answer:

ITS NOT B I THOUGHT IT WAS BUT DO NOT PUT B I PUT B AND GOT THE QUESTION WRONG

Explanation:

DONT PUT B just trying to help idk the answer but not b

                                                                                                                                                                                                                                               

The study of a current business and information system application and the definition of user requirements and priorities for a new or improved information system are part of which phase? (Points : 2) Problem analysis phaseScope definition phase
Requirements analysis phase
Decision analysis phase
None of the above

Answers

Answer: Problem analysis phase

Explanation: Problem phase analysis is the mechanism that helps in studying the problems and issue that occur in the application and system of any business organization.It helps in identification of the reason and consequences of the detected problems.The requirements of user and resources to accomplish business system is also analyzed.

Other options are incorrect because scope definition phase is used for identification of the boundaries of any project regarding opportunities and issue in business .

Requirement analysis phase is used for gathering the need of the user and the condition requirement to fulfill a project. Decision phase analysis is done to bring out the best possible solution for any project. Thus, the correct option is problem analysis phase.

You have been asked to write a two-page report that explains the extent to which the IT department can configure the cryptographic features of Word 2010. What is the process involved in configuring encryption?

Answers

Answer:Encryption is the process

of translating plain text data into something that appears to be random and meaningless. A symmetric key is used during both the encryption and decryption process. To decrypt a particular piece of ciphertex, the key that was used to encrypt the data must be used.

Types of encryption

1.Symmetric encryption :This is also known as public key encryption. In symmetric encryption, there is only one key, and all communication patties use the same key for encryption and decryption.

2.Asymmetric encryption :This is foundational technology for SSL(TLS)

How encryption is being configured

Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key.

Explanation:

Other Questions