There are a number of syntax errors in the following program. Locate as many asyou can.*/ What's wrong with this program? /*#include iostreamusing namespace std;int main();}int a, b, c \\ Three integersa = 3b = 4c = a + bCout < "The value of c is %d" < C;return 0;{
Q: To exchange the value of registers BX =1256H and DX-7894H by using stack instruction, this is done.…
A: Given: Explain the correct Answer to exchange the value of Register.
Q: Describe these terms: A website is one. Buses are ranked second. The mother board, third
A: Definition: It may be read and accessed using an Internet browser by supplying a URL address. These…
Q: What is null pointer?
A: A value preserved to indicate that a pointer or reference doesn't correspond to a valid object is…
Q: Use the data set "longley" in R to answer the following questions Read the data set "longley" in R…
A: R is a programming language for statistical computing and graphics supported by the R Core Team and…
Q: Describe the AWS Global Infrastructure, starting with the largest element and working your way down.
A: The answer to the question is given below:
Q: Your company has made the decision to replicate its product database over numerous servers in order…
A: Replication of data encourages data security. Another precise version may be utilised if a calamity…
Q: How do symmetric key cryptography and asymmetric key cryptography vary from one another in terms of…
A: There are primarily 2 cryptographic strategies for computer security, namely: encryption using…
Q: Distinguish between short and long jumps on the 8051 microcontroller. Describe five conditional jump…
A: Given:- Explain the differences between short jumps and large leaps on the 8051 microcontroller.…
Q: In question b, the difference between processing delay and queue time is discussed in full. Think…
A: Processing sluggish The time it takes the router to decide where to transmit the packet is known as…
Q: Describe KDD. Do the two vary in any way from one another?
A: Data mining is the process of sorting through large amounts of data to identify patterns and…
Q: What firmware specification may store disk encryption keys? Answer choices USB TPM SLA UEFI Which,…
A: yes , you are right The Anser is TPM (Trusted Platform Module ) EXMPLANATION :- Trusted Platform…
Q: What is the absolute lowest number of keys needed for public key cryptography
A: In the case of public-key encryption, a pair of keys is required to decipher the message. One of the…
Q: Briefly describe the system development life cycle (SDLC) and the different SDLC approaches.
A: System Development Life Cycle (SDLC) : System Development Life Cycle refers to a process followed by…
Q: The content of the register AL after the execution of instruction (MOV AL,65) is: O AL=01000001 O…
A: Answer: Processor operations for the most part include handling information. This information can…
Q: ch scenario concerning the e-school system do you want me to loo
A: Introduction: E-Learning allows for scalability, which aids in training delivery. All students can…
Q: One of the main difference between isolated 1/0 mapping and memory mapped I/O? Isolated I/O is…
A: Microprocessor is 16 bit single integrated circuit having arithmetic and logical circuit to perform…
Q: What challenges do users of global information systems face?
A: Answer is in next step.
Q: Question-7 What are the features of inkjet printers?
A:
Q: How precisely does multifactor authentication operate? What function does it serve in protecting…
A: Multifactor Authentication : In order to access a resource like an application, an online account,…
Q: What do you mean by #include?
A: Answer : This is used in c programming language and it include all the stdio.h files into source…
Q: How do I convert a numeric IP address like 192.18.97.39 into a hostname like java.sun.com?
A: converting a numeric IP address like 192.18.97.39 into a hostname like java.sun.com:-
Q: stack can be: * Used for temporary storage of flag register Used for temporary storage of addresses…
A: :: Solution:: Option (b) Used for temporary storage of addresses for CALL instruction
Q: Give examples of software process activities (other than prototyping and incremental delivery) that…
A: The following are some of the reasons why change is unavoidable in complex systems: It is…
Q: How may bank fraud be prevented in the future? What security holes are employed in bank fraud?
A: Introduction: The Internet, specifically, is vigorously utilized in a bank or monetary…
Q: Find the four reasons why databases fail, and then provide a plan (or approaches) to stop data loss.
A: Answer: The following are the four primary reasons why databases fail: 1. Inadvertent file deletion…
Q: What is De-normalization?
A: Explanation : What is De-normalization : As a database optimization approach known as…
Q: The information on your computer or personal digital assistant should be recognized and categorized.…
A: The recipient of the information assigns meaning to the stimuli they receive in some context. Data…
Q: How can the performance of a software be estimated using paprameters? Why is it crucial to compare…
A: The answer is given below step.
Q: ere the objectives for the evaluation's user experience and usability divi
A: Introduction: Because usability is an important component of overall UX, this blog post focuses on…
Q: Time for a product recommendation based on the current environment. You may illustrate this with a…
A: Given It's time for a contextually relevant product recommendation. This can be demonstrated with a…
Q: Difference between global and static variable?
A: Global variables: Variables declared as static at the high level of a source code (outside of the…
Q: What goods and services does IPSec provide?
A: IPsec: IPsec is a collection of protocols used in conjunction to establish encrypted connections…
Q: 9. Where the function pointers can be used?
A: Function Pointer(FP) is basically used to implement the run-time binding. FP is a pointer that will…
Q: the CSMA, CA, and CD. Describe the purpose and planned network for each one. describing the…
A: Advantage of CSMA CD CSMA CD is used to avoid any form of waste transmission It is used to use or…
Q: Choose the most important stage of the SDLC, and then provide at least two instances or situations…
A: Given: The software industry uses the SDLC, or software development life cycle, method to design,…
Q: How may consumers get home delivery of digital multimedia content? What kind of hardware and…
A: How may consumers get home delivery of digital multimedia content? What kind of hardware and…
Q: What function does the internet, in your opinion, serve in the lives of those who are disabled? •…
A: The internet has always been a powerful tool. It has been used by people with disabilities to…
Q: In string manipulation, one of general-purpose register can be used in loop, shift/rotate…
A: Microprocessor is 16 bit single integrated circuit having arithmetic and logical circuit to perform…
Q: Construct a formal proof of validity for the given arguments below using the indicated method in…
A: Answer: We need to prove the given formal is true or not so we will see in the more details with the…
Q: What weaknesses in the router layer 2 protocol may be found? Why, even after changing the serial…
A: Required: In what ways might vulnerabilities in the router layer 2 protocol be identified? Why does…
Q: Question-7 What are the featu nkjet printers?
A: Here in this question we have asked that what are some features of inkjet printer.
Q: How does a database management system function? What is it?
A: Definition: Users may establish, develop, manage, and regulate database access using the Database…
Q: How were the objectives for the evaluation's user experience and usability divided?
A: The objectives for the evaluation's user experience and usability were divided into two groups:…
Q: INSTANCE: A plane graph G = (V, E) (that is a graph embedded in the plane without intersections),…
A: Answer: We need to write the how to identify the Graph Hamiltonian or not . So we will see in the…
Q: What component of business intelligence is the most crucial? What are the differences, for instance,…
A: Understanding the major components of business intelligence : Business intelligence gathers,…
Q: the advancement of switching and routing technologies across time.
A: The response is provided down below: The development of routing technology throughout the years…
Q: Whichever phase of the SDLC you believe to be the most important, explain your position with at…
A: Introduction Requirement assortment and analysis is that the SDLC most crucial section as a result…
Q: One-time-use credit card numbers are issued by certain credit card providers as an extra layer of…
A: Order to make purchases at participating merchants using a credit line that has been pre-approved,…
Q: When we speak about Zero Knowledge protocols, what precisely do we mean?
A: Zero Knowledge Protocol is the way of doing authentication where no passwords are exchanged, which…
Q: What distinguishes conventional on-premises data centers from cloud IT security implementations, and…
A: Given: What distinguishes conventional on-premises data centres from cloud IT security…
There are a number of syntax errors in the following program. Locate as many as
you can.
*/ What's wrong with this program? /*
#include iostream
using namespace std;
int main();
}
int a, b, c \\ Three integers
a = 3
b = 4
c = a + b
Cout < "The value of c is %d" < C;
return 0;
{
Step by step
Solved in 4 steps with 3 images
- be recor #include #include minutes #include limit on int func(int, int, int, int); main(){ srand(time(NULL)); int a, b, c, fNum; printf("Choose three different numbers between 0-39:"); scanf ("%d%d%d", &a, &b, &c); fNum = func (a, b, c, 25); printf("\nThe result: %d", fNum); } int func (int ul, int u2, int u3, int iter){ srand (time (NULL)); int n1=0, i=0, count=0; for (;iComputer Science What does the following code print out? void confuse(int * a, int * b) { int * c = b; *a = *b + *c; a = c; *a = *b + *c; } int main() { char a[4] = “cat\0”; char b[4] = “bar\0”; char * c; c = b; c[0] = 'p'; c = b + 1; int * x; int * y; int * z; printf(“%s%s\n”, a, b); printf(“%s%s\n”, c, a); int i = 5; int j = 1; int * x = &i; int * y = &j; printf(“%d, %d\n”, *x, *y); confuse(x, y); printf(“%d, %d\n”, *x, *y); }Void Do1 (int: &, a. int &b) { a = 5; a = a + b; b = a + 2; } Int main() { Int x = 10; Do1 (x,x); Cout << x << endl; } The output of this program is#include using namespace std; int main () int x, y; { X = 5; y = ++x cout << x << y; %3D ++x; %3D x = 5; y = x++ * ++x; cout << x < y; return e; } 525636 747953 749735 636636#include <stdio.h>int main(){int d;int s[20],i, j, p, lg=0,m,t=0;char c;printf("Enter number of sale: ");scanf("%d", &d);for(i=0; i<d; i++){ printf("\n sales %d sales: ",i+1);scanf("%d", &s[i]);}for(i=0; i<d; i++){for(j=i+1; j<d; j++){if(s[i] > s[j]){p= s[i];s[i] = s[j];s[j] = p;}}}printf("\n sales lowest to highest: ");for(i=0; i<d; i++){printf("\nsales %d ", s[i]);}printf("\n highest: %d ",t);getch();} it should be: highest : 2000int x1 = 66; int y1 = 39; int d; _asm { } mov EAX, X1; mov EBX, y1; push EAX; push EBX; pop ECX mov d, ECX; What is d in decimal format?#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…Q 6:- Specify the local and Global variables used in the code below and express the reason r'. #include int a=10,b; void main() { printf("a = 8d and b=%d“,a,b) ; #include void main() { int x-23, y-4; printf("x = %d and y=sd“,x,y);Refer to the statement below, #include void main() { int i; int number[11]={12,15,17,3,2,7,10,10,15,15,50}; for(i=0;i < 11; į++){ printf(" %d", number[i]); } Write a segment in C language to: Compute the average number Find the maхітит аnd minimum питberSEE MORE QUESTIONS