Refer to the statement below, #include void main() { int i; int number[11]={12,15,17,3,2,7,10,10,15,15,50}; for(i=0;i < 11; i++){ printf(" %d", number[i]); ww Write a segment in C language to: Соmрute the average number питber Find the maхітит аnd minimum nиmber
Q: 3. Explain the following in terms of a database's security: Views: (a) authorization; (b) access con...
A: AS PER OUR POLICY “Since you have posted a question with multiple sub-parts, we will solve the fir...
Q: This program in C++ will obtain from the user a full name, a current annual salary, and a percent in...
A: The required code for the C++ program is coded using a for loop in the next step.
Q: What happens when a user modifies the value input in a combo box's text field or chooses a different...
A: Introduction: This issue debates what happens when a user changes the value they've input in the tex...
Q: One of the most crucial elements to consider while installing new software is the hardware.
A: Intro Installation of Software Software Installation : The Installation process for software or app...
Q: What does "interdependence" represent in terms of system notions, and how does it vary from other ph...
A: Introduction: Objects that are mutually dependent on one another are said to be interdependent. Plan...
Q: 1. A module operates on sets of inputs that occur as natural ranges, and values within ranges are al...
A: c) CORRECT Because the Black-Box described above can be any software system that you want to evaluat...
Q: Describe the security model that the CNSS employs.
A: Introduction: The CNSS security paradigm was created by John McCumber. It is also known as the McCum...
Q: Write a user-defined MATLAB function that converts speed given in units of miles per hour to speed i...
A: The solution for the above-given question is given below:
Q: Write a bash script that will create another bash script and run it, the newly generated bash script...
A: Here as like you asked i am only creating a bash script that will create another bash script
Q: Reasons why it's important to have a strong theoretical background that helps you understand grammar...
A: Introduction: Grammar is the fundamental ingredient that makes up knowledge or a certain subject of ...
Q: How did computer security grow into the shape we see today?
A: Introduction: Cybersecurity, also known as information technology security, is the act of protecting...
Q: Provide proofs or disproofs of the following arguments (use conditional proof and 4 quantifier rules...
A: Explain: x represents anyone. R (x): He fixes his own car. H (x): High skill. S (x): Save a lot of m...
Q: Many times, the needs of several stakeholders are conflicting. Describe ONE technique for reaching c...
A: Introduction: Stakeholders in a company include its employees, suppliers, local communities, credito...
Q: Q1. I Distinguish between the Go-Back-N ARQ and the Selective Repeat ARQ approaches. Use an example ...
A: Introduction Q1. (i) Differentiate between Go-Back-N ARQ and Selective Repeat ARQ methods. Explain w...
Q: What steps may be taken to ensure data integrity?
A: Answer: The physical data model is the representation of the data on which the database will be bui...
Q: Describe the elements that contributed to the growth of computer security into the information secur...
A: Introduction: Computer security, also known as cybersecurity or information technology security, is ...
Q: What happens if you push Enter when the emphasis is on a Button control?
A: Introduction: This inquiry is about what happens if you push Enter when the emphasis is on a Button ...
Q: Write a program called asyncFileCount.js that prints the number of files with a given extension in a...
A: Introduction
Q: Show if the statements are true or false and provide a brief explaination as to why. If A ∈ B and B...
A: Show if the statements are true or false and provide a brief explaination as to why. If A ∈ B and B ...
Q: Discuss three reasons why it is necessary to design an application's user interface before beginning...
A: Introduction: The user interface of the application An application's user interface's look and feel ...
Q: At the Transport layer, which protocol establishes virtual circuits between hosts?
A: Introduction: Virtual Circuit is a type of computer network that focuses on connection-based service...
Q: The first two bytes of a 4M x 16 main memory have the following hex values: Byte 0: FF Byte 1: 01 If...
A: Below is the answer to above question. I hope this will be helpful for you...
Q: During the planning and execution of a training event, evaluate the efficacy and use of interpersona...
A: Introduction: In everyday routine, it is the kind of capacity we communicate with, such as communica...
Q: What is DOS, exactly? What exactly is the procedure? Why not provide an example to prove your point?
A: Introduction: "Disk Operating System" is the abbreviation for "Disk Operating System." The DOS opera...
Q: Indexing of databases What exactly do you mean when you say "buffer management" and "replacement str...
A: Intro In Database management system, data must be in RAM for DBMS to operate on it. As per memory us...
Q: Assembly language program a wave on the port pin P1.0
A: Below the assembly language program a wave on the port pin P1.0
Q: What variables have had a role in the growth of computer security into the modern era of information...
A: The elements listed below have aided in the growth of computer security into current information sec...
Q: In raster scan and vector scan displays, distinguish between the functions of a processor.
A: Given: Function properties of Raster and Vector scans
Q: Demonstrate the business benefits of a data-driven website.
A: A data driven website is a website that can easily be updated by the managers of the website.It is u...
Q: Let R = (J,K, L, M, N, P) and F = {J → KL, L → J, MNP → K, KP – M, LJ → N}, give a canonical cover F...
A: As per guideline, I can do only first one. Please re-post pending question in next post. I hope you ...
Q: hat are the distinctions between passive and active attack?
A: Introduction: Active attacks are the kind of assaults in which the attacker attempts to change or mo...
Q: Explain the many technologies that allow users to communicate large amounts of data across any netwo...
A: • File transfer protocol enables users to send and receive files over the Internet. • By using Pee...
Q: onsider a disc with 512-byte sectors, 1,000-track platters, 100-sector tracks, ten-track cylinders, ...
A: Intro The size of a sector is 512 bytes. A plater has 1000 tracks. A track has 100 sectors. A cylin...
Q: computer - Describe some of your media and information literacy behaviours or practises.
A: Introduction: It is described as the capacity to seek, evaluate, organise, utilise, and convey infor...
Q: software engineering short question. Describe the meaning of fiure 16.1 in your own words.
A: Introduction software engineering short question. Describe the meaning of figure 16.1 in your own...
Q: Write a program that computes the following. Use while loop. Define a function as follows: public st...
A: Here I have defined the function addAll(). In this function, I have used a while loop till the value...
Q: What exactly is the distinction between a class and a class instance?
A: A class and class instance are the concept in object-oriented paradigm. In this we focus on the data...
Q: pick a provider model example and explain the benefits and drawbacks of that particular model.
A: IaaS(Infrastructure as a service) IaaS is a sort of distributed computing administration that offer...
Q: Protocols that operate on the transport layer. The use of TCP and UPD in modern networks poses a num...
A: There are many applications where dependability is critical, such as file transmission and email. TC...
Q: |Consider the formula C = 3x Vy.p(x,y) → q(y). For each of the following nterpretations, determine i...
A: Hey there, I am writing the required solution for the above stated question.
Q: Demonstrate the structure and organisation of optical storage technology. Describe how optical stora...
A: Introduction: An optical disk storage device, according to the question, consists of a revolving dis...
Q: Can you tell the difference between data definition commands, data manipulation commands, and data c...
A: We are going to understand DDL(data definition commands),DML(data manipulation commands) and DCL(dat...
Q: Mention and explain several encryption and network access management strategies. Mention a few obsta...
A: Introduction Mention and explain several encryption and network access management strategies. Mentio...
Q: Explain how a company's database is used in their information systems, using any company as an examp...
A: Organizations use databases to make better data access within the company, stronger relationship bet...
Q: Is it the database administrator's responsibility to backup the database, or is it the database user...
A: Introduction: We'll figure out who's in charge of keeping the database backup.
Q: What languages are included in the oops concept?
A: Question. What languages are included in the oops concept?
Q: Examine how mobile phone usage has changed over time and how it relates to invention, innovation, an...
A: Social changes are the transformation of culture and social thoughts throughout time, by the collect...
Q: How does a computer save the following information? picture, audio, video, and word document?
A: All of this is stored on computers in digital format, which is understandable by machine alone in co...
Q: Computer science Which organisation uses the acronym ANSI?
A: Introduction: The American National Standards Institute Which organization uses the acronym ANSI?
Q: Why is payroll seen to be an excellent application for batch processing using magnetic tape storage ...
A: Introduction: The batch processing utility takes the input data in bulk, checks its specifications, ...
Step by step
Solved in 3 steps with 4 images
- void funOne(int a, int& b, char v); void main() { int num1=10; char ch='A'; funOne(num1, 15,ch)<#include using namespace std; int main() { int numbers[10]; int i; for (i=0;i>numbers[i]; int numbers2[10],j,k; for(i=0;ic) { max1=rep; c=top; } } cout<#include void main () { int a=5,b=10,c=1; if (a && b>c) { printf("cquestionbank"); } else{ break; } }#include using namespace std; int main() int x=1,y=2; for (int i=0; i<3; i++) e{ x=x*y; 8{ } cout<#include #include #include #define SIZE 5 int nums [SIZE] = [5,0,6,1,2); int main() { int i; pid_t pid; pid= fork(); if (pid == 0) { for (i = 0; i 0) { wait (NULL); } for (i = 0; i < SIZE; i++) printf("PARENT: %d\n", nums [i] + 1); /* LINE Y */ return 0; From the above-given program, please state what will be the output at lines X and Y. Explanation in detail required for output at both lines X and Y.C. #include int main() { char name[20]; printf("\nEnter your name :"); gets (name) ; printf("\nYour name is "); puts(name); }#include using namespace std3; int main() { int x-6; int y=103; int z=0; int q=1; Z+= X-- -ys q*=++z+y; cout<Please explain this question void main() {int a =300; char *ptr = (char*) &a ; ptr ++; *ptr =2; printf("%d", a); }int func(int a, int b) { return (apointers as Arguments:In the C programming language there is no pass-by-reference syntax to passa variable by reference to a function. Instead a variable is passed by pointer(just to be confusing, sometimes passing by pointer is referred to as pass byreference). This Practice Program asks you to do the same thing as C.Here is the header for a function that takes as input a pointer to an integer:1. void addOne (int ∗ptrNum )Complete the function so it adds one to the integer referenced by ptrNum.Write a main function where an integer variable is defined, give it an initialvalue, call addOne, and output the variable. It should be incremented by 1.This assignment is not graded, I just need to understand how to do it. Please help, thank you! Language: C++ Given: Main.cpp #include #include "Shape.h" using namespace std; void main() { /////// Untouchable Block #1 ////////// Shape* shape; /////// End of Untouchable Block #1 ////////// /////// Untouchable Block #2 ////////// if (shape == nullptr) { cout << "What shape is this?! Good bye!"; return; } cout << "The perimeter of your " << shape->getShapeName() << ": " << shape->getPerimeter() << endl; cout << "The area of your " << shape->getShapeName() << ": " << shape->getArea() << endl; /////// End of Untouchable Block #2 //////////} Shape.cpp string Shape::getShapeName() { switch (mShapeType) { case ShapeType::CIRCLE: return "circle"; case ShapeType::SQUARE: return "square"; case ShapeType::RECTANGLE: return "rectangle"; case…c++ computer language what is the output of the following code segment? int main() { int myarray[]={-200, 33, 89, 50, 44}; sub(myarray, 5); for(int i =0; i<5; i++) cout<<myarray[i]<<" "; cout<<endl; system("pause"); return 0; }; void sub(int arr[], int z) { for(int i =0; i<z; i++) arr[i] = arr[i] - i; }SEE MORE QUESTIONSRecommended textbooks for youC++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology PtrC++ for Engineers and ScientistsComputer ScienceISBN:9781133187844Author:Bronson, Gary J.Publisher:Course Technology Ptr