Write a program called "pointerArray.cpp" using knowledge of pointer. The program must illustrate the use of a pointer that point to the content of an array and to display the contents of an integer array {5, 10, 15, 20, 25, 30, 35, 40} in order and reverse order. For example the output should be as follows: The numbers in the array are: 5 10 15 20 25 30 35 40 The numbers in reverse order are: 40 35 30 25 20 15 10 5
Q: Identifying a range of data preservation strategies should be second nature to any company.
A: Explanation: The multiple techniques for preserving data for every firm are as follows: 1. Deciding…
Q: Q1) Analyse TWO(2) differences between the HTTP POST and HTTP GET method to send data to the server.…
A: GET is less secure compared to POST because data sent is part of the URL.
Q: What will be the output of the following Python program?
A: Here the while loop runs till the condition i<5 holds true. The break statement if executed will…
Q: A fully connected neural network with the same size layers as that of a corresponding CNN represent:
A: A fully connected neural network with the same size layers as that of corresponding CNN represents
Q: Refer to the code fragment below and convert the following Queue structure into a Stack structure.…
A: In this coding question - we have to convert the queue implementation where we need to convert this…
Q: ”:40, “peter”:45} D. all of the me
A: correct option is d) All of the mentioned
Q: Write a C program that reads in as many integer numbers from the keyboard to an array as the number…
A: So, we are given a name string that is name : Jesse Armstrong It has 15 characters including space…
Q: What makes median filter more effective in the removal of salt-and-pepper noise than mean filter?…
A: Answer: median filter more effective in the removal of salt-and-pepper noise than meanfilter becuse…
Q: QUESTION 2 What will be the output of the following Python code? A. error B. a b c d…
A: Python code to convert lower case to upper case
Q: combinational circuit is defined by the following three Boolean functions. Design the circuit with a…
A: The answer of this question is as follows:
Q: What is cloud computing, and what are the three types of cloud services?
A: Cloud computing means storing data and programs over the internet instead of your computer's hard…
Q: Make a list of databases that contain your data. How are the databases' data collected? Who updates…
A: A list of databases accessible in your country can be obtained online.When you enter information…
Q: If we're talking about computers, how do hardware and software differ?
A: GIVEN: Hardware refers to a computer system's actual and visible components, such as the monitor,…
Q: side to using mobile devices? Are the savings comparable to those of syst
A: Introduction: The savings comparable to those of systems based on the internet
Q: LLC sublayer
A: Given :- In the above given question, a term LLC sublayer is mention in the above given question…
Q: Explain how someone can utilize the internet to spread love and peace.
A: INTERNET: The Internet (or internet) is a global network of interconnected computer networks that…
Q: Cloud security might be significantly affected by the data leak, but is this possible? Why should I…
A: Definition: Is it possible that a data breach might have a major impact on cloud security? What are…
Q: How the DNS works, from iterated and non-iterative requests to authoritative and root servers to DNS…
A: Introduction: DNS (Domain Name System): DNS is the Internet's telephone directory. Humans regularly…
Q: What Are Some of the Advantages of Running?
A: The answer to the following question:-
Q: What are condition variables, and how do they work? What exactly is a monitor? When used in…
A: Given: Condition variables: In software, method data is loaded in page-sized chunks. The CPU stores…
Q: Write the definition of a class named WeatherForecast that has the following methods: • An_init_…
A: The Answer start from step-2.
Q: If your database's referential integrity isn't enforced, What are the most common errors?
A: answer is
Q: Iterated and non-iterated queries, root servers, authoritative servers, and DNS records should be…
A: Non-iterative Query ->In non-iterative name query, the DNS client requires that the DNS server…
Q: create implementations of DFS with a Stack and BFS with a Queue
A: Answer: Code: // The BFS algorithm in C++ #include <iostream> #include <list> using…
Q: Which of the following optimization strategies is preferred for training deep neural networks?…
A: In the given question Gradient Descent is the most basic but most used optimization algorithm. It's…
Q: Describe the steps involved in creating the smallest transport-layer protocol.
A: The following technique details how to create the simplest possible transport-layer protocol:
Q: Which of the following is true about the number of parameters in parametric and non- parametric…
A: The right answer is option(3) Explanation:- The parametric model uses the fixed numbers of…
Q: As far as advantages go, how comparable are cloud computing and on-premises computing? Is cloud…
A: Introduction: Rapid Scaling considers speed and license availability, and is designed specifically…
Q: penefits of using IT Stigmergy as
A: Stigmergy is an indirect, intervened style of activity coordination where the hint of one activity…
Q: Why do servlets outperform programs that use the common gateway interface (CGI), despite the fact…
A: Servlets: It is a server side component that provides web applications for the server side. In…
Q: Tell us why magnetic tape is still being used where you found it.
A: INTRODUCTION: Here we need to tell why magnetic tape is still being used and where you found it.
Q: Is using search engines on the internet lawful or ethically problematic?
A: It is legal to use search engines on the Internet.
Q: Do data breaches have the potential to have a significant effect on cloud security? Does anybody…
A: INITIATION: Unauthorized access to and disclosure of sensitive, confidential, or otherwise protected…
Q: The following is the state diagram of a Turing machine M1 with input alphabet {0, 1} and accept…
A: Given :
Q: s it reasonable to assume that peo s behind technical breakthroughs?
A: People and information systems are the driving forces behind technological progress. Today, systems…
Q: Which of the following are valid justifications for using CNNS?
A: which of the following are valid justifications for using CNN
Q: What are some of the features of 802.11ac and 802.11n?
A: Features of both 802.11ac and 802.11n
Q: Are there ways to improve cloud security after a data breach? What are some of the possible…
A: Data loss in the Cloud A data breach is the purposeful or accidental exfiltration of…
Q: The term "full-service provider" may signify several different things. In what ways are full-service…
A: A full-service provider may provide a wide variety of services, including design, research and…
Q: Internet traffic management is handled by a single central distribution centre if the assumption…
A: Definition: This inquiry explores if the assertion that internet traffic is managed by a single…
Q: Which of the following is the largest quantity? Select one: O a. The octal number 05272 O b. The…
A: Answer is (c). The Binary number 101010111111 Convert all the values into binary. (05272)8 =…
Q: 3. House +numberRoom:int +tyge:String +Qisplaylnfol); Bungalow +location:String +gwnerName:String…
A: Here is The Solution. public class House{ public int numberRoom; public String type;…
Q: Is it possible to provide an example of a real-world SQL database?
A: It would be an understatement to assert that databases are ubiquitous. Online retailers, health care…
Q: What are the hurdles that firms face when attempting to migrate to a cloud platform? Is there a…
A: Cloud computing platform: The 'cloud platform' is the environment that allows a software service or…
Q: When it comes to partitioning algorithms, why are there so many different ones in use by operating…
A: INTRODUCTION: We need to explain why operating systems utilize so many distinct partitioning…
Q: need the answer quickly
A: Thank you ___ illustrationgroup ____
Q: In descriptive analytics, OLAP plays a different function from OLAP in the data warehouse.
A: OLAP is also known as online analytical processing.
Q: What three variables are considered while making a hardware purchase?
A: let us see the answer:- Introduction:- When choosing computer hardware and software, the following…
Q: If n is the number of data points in a training set, d is the data dimensionality and k is the…
A: Answer: If n is the number of data points in a training set, d is the data dimensionality and k is…
Q: What situations call for the conglomeration of groups of applications or processes in the form of…
A: Circumstances: If the processes share a standard set of resources, it makes sense to classify them…
Write a program called "pointerArray.cpp" using knowledge of pointer. The program must illustrate the use of a pointer that point to the content of an array and to display the contents of an integer array {5, 10, 15, 20, 25, 30, 35, 40} in order and reverse order. For example the output should be as follows: The numbers in the array are: 5 10 15 20 25 30 35 40 The numbers in reverse order are: 40 35 30 25 20 15 10 5
Step by step
Solved in 4 steps with 2 images
- In C Programming, write a program that creates an array of N names. Each name has 5 exam scores. Output the names with the highest and lowest average scores. No using of Struct, no using of Pointers and No Global Declaration.Write a program in C Language which fulfills the following criteria a. Declare 3D array named “array3d" with the dimension of 2 x 3 x 4 b. Assign random numbers to array3d by using the function rand(). The range of random number must be between 0 to 99. c. Copy all the contents of “array3d" to new matrix called array3d_new by using the addresses of memory location. Keep in mind that you have only the initial or starting address of mattrix array3d. You need to show and print that address. Perfom the task by calling functions. d. In "array3d" there are 4 copies of 2 x 3 matrix, add the respective elements of the first two matrix in a new matrix called sum2d_a (the dimension of this newly created matrix is 2 x 3). Perform the same task for the remaining two matrixes and store the result in sum2d_b. Now create the new matrix namely sum2d containg both copies of sum2d_a and sum2d_b with the matrix size of 2 x 3 x 2. You need to perform all these tasks using FUNCTIONS. e. Write a function to…Java Program - Functions with 2D Arrays Write a function named displayElements that takes a two-dimensional array, the size of its rows and columns, then prints every element of a two-dimensional array. Separate every row by a new line and every column by a space. In the main function, write a program that asks for integer input to be assigned on a 3 x 3 array and call the function displayElements to print the contents on the next line. Input 1. Multiple lines containing integer each line Output R1C1: 1 R1C2: 2 R1C3: 3 R2C1: 4 R2C2: 5 R2C3: 6 R3C1: 7 R3C2: 8 R3C3: 9 1 2 3 4 5 6 7 8 9
- Use C++ Programing language. Write a program that simulates a lottery. The program should have an array of five integers named winningDigits, with a randomly generated number in the range of 0 through 9 for each element in the array. The program should ask the user to enter five digits and should store them in a second integer array named player. The program must compare the corresponding elements in the two arrays and count how many digits match. For example, the following shows the winningDigits array and the Player array with sample numbers stored in each. There are two matching digits, elements 2 and 4. WinningDigits 7 4 9 1 3 player 4 2 9 7 3 Once the user has entered a set of numbers, the program should display the winning digits and the player’s digits and tell how many digits matched.Multi Dimensional Arrays in C Program Ask the user for the number of rows and columns of a two-dimensional array and then its integer elements. Then, ask the user for another integer value which represents a boogeyman. A boogeyman is a value that we intend to find from a given array. Find and output the coordinates of the boogeyman by this format: "BOOGEYMAN LOCATED AT ROW {row_number}, COLUMN {column_number}!" Input 1. One line containing an integer for the number of rows 2. One line containing an integer for the number of columns 3. Multiple lines containing at least one integer each line for the elements of the array Sample 1 4 2 3 9 1 2 3 4 2 1 1 9 2 8 3 4. One line containing an integer for the boogeyman's value Output Print the row of the position first and then the column of the position. Note that the row and the column is 0-based (i.e. it starts at 0 and not at 1). It is guaranteed that the boogeyman exists and only once in the 2D array. Enter# of rows: 4 Enter…In C Programming: Write a function inputAllCourses() which receives an array of course pointers and the array’s size, then allows the user to input all courses in the array by calling inputCourse()
- Answer in C++ Programming Language. C++, Array Write a program that will ask the user to enter a set of numbers and outputs all the subsets of that set. The size of the array is 5. Ask the user if he wants to repeat the program by pressing y/Y.This is for a C++ class Part 2a: Find the Median Write a program that prompts the user to enter a number of estimated home values (integers). First, ask the user how many estimates will be entered and then prompt for and store those values into an array. Your program should then compute the median estimated home value. Note that you will need to first sort the estimates in ascending (or descending) order before you can compute the median. Display the median value. Your program should use pointers to the array. Hint: you may consider writing a function that accepts the array of integers in sorted order and an integer representing the array size and return the median value. Part 2b: Password Verification A secure password is critically important in today's world. Organizations typically have stringent requirements to ensure a password is complex enough so as not to be easily hacked. Write a program that will accept as input a potential password and determine whether or not it is…Write a C++ program that reads 6 real numbers from the user (negative and positivenumbers) into an array, then it does the following: Display all the values of array in reverse order. Find the sum and average of positive numbers of the array and display them. Count negative numbers of the array and display it. Find the minimum value of the array and display it. Find the index of the minimum value of the array and display it.
- Please fast : Write a C program that reads 5 numbers from the user and store them in an array. Then you have to compute the square and cube of each number and store them in different arrays. Having computed the square and cube of the numbers, print each number with its square and cube value. Your program should include a function called get_square_cube, which will compute the square and the cube values of the numbers and store each in a different arrayIn C programming: Write a function printAllCourses() which receives an array of course pointers and the array’s size, then prints all courses in the array by calling printCourseRow()In C++ Programming Lanaguage write a program that simulates the rolling of two dice. The sum of the two values should then be calculated. Your program should roll the two dice 36,000,000 times. Use a one-dimensional array to tally the numbers of times each possible sum appears and print it. Also, determine if the totals are reasonable (i.e., there are six ways to roll a 7, so approximately one-sixth of all the rolls should be 7). [Hint: what is the minimum and maximum sum obtained when you roll a die? Some sums are more frequent than the others.]