Question

1. single element of an array can be passed to the function? true or false.

 

2. Array can be declared as constant? true or false.

 

3. which of the following gives the memory address of the first element in array x?

a. X

b. X[0]

c. X{0}

d. X_0

e. X(0)

 

4. The index of the last element of array X whose size is S?

a. S+1

b.

S-1

c. 0

d.1000

e. S

 

5. Assume you have the following declarations const int MAX = 1000;double A[MAX];which of the following sentences is incorrect?

a. The assingnment statement MAX = 1000 is mandatory.

b. we can store up to 1000 values in the mandatory.

c we cannot change the size of the array A during the runtime.

d. all values in the array are set to ZERO's (0)

e. all above sentences are correct.

 

6. The only difference between char array and string is that, the string ends with '\0'? true or false.

 

7. Index of an array can be of type integer or double, since both deals with the digits? True or False

 

8. Which definition describes the term Array precisely?

a. An array is a series of numbers of the type integers (int).

b. An array is a series of numbers of the same type either integers (int) or real (float double).

c. An array is a series of elements of the same type in continuous memory locations.

d. An array is a series of elements of the same type placed in non-continuous memory locations.

e. None of the above.

 

9. Which of the following will access the seventh element stored in array X? a. X{6}.

b. X[n-1].

c. X[7].

d. X{7}.

e. X[6].

 

10. Which one of the following is the correct declaration after including its required pre-process?

a. bool genders[] {male, female,male,male,male);

b. double x[3.0];

c. int 3A[5];

d. string namel] = {"",""};

e char key[] = ['a', 'b'];

 

11. Which of the following information is not essential in the array declaration?

a. Size (where the initializations list is not given).

b. Initializations (where the Size is given).

c. Type.

d. Name.

e. Both the Size and Initializations.

 

12. Arrays are always passed-by-reference to functions, so there is no way to prevent reflecting the functions' changes made to arrays; into the source array? True or False

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Engineering

Programing

Related Computer Engineering Q&A

Find answers to questions asked by students like you.

Q: You are required to write a C++ program that reads several hundreds of movie ratings from an input f...

A: Program: //Header file #include <iostream> #include <vector> #include <fstream> #i...

Q: What type of device does a computer turn to first when attempting to make contact with a host with a...

A: Device used to contact with a host The device used by computer to make contact with a host with a k...

Q: In §12.2 Lamport's Hash we mentioned the notion of using only 64 bits of the hash. At each stage, 12...

A: Lamport’s Hash Function: Lamport's Hash is a hashing method which implements one-time password. The...

Q: is represents a data point or value that originates 7. from a worksheet cell. Select one: O a. Legen...

A: Data marker: It is an important event in a chart, which occurred on a specific data point. A bar, d...

Q: What kind of attack simulation detects vulnerabilities and attempts to exploit them? a. Red team-blu...

A: Penetration testing is an attack that finds the vulnerabilities and tries to clear them. Hence, corr...

Q: Which of these attacks is a form of Wi-Fi DoS attack? a. Rogue DHCP server b. FTP bounce c. Deauthen...

A: Click to see the answer

Q: What type of diagram shows a graphical representation of a network’s wired infrastructure? a. Rack d...

A: Wiring schematic: It is a pictorial representation of an electric circuit. It represents the compon...

Q: Why is it critical to perform a penetration test on a web application and a web server prior to prod...

A: Hey, since there are multiple questions posted, we will answer first question. If you want any speci...

Q: Which transmission characteristic is never fully achieved? a. Latency b. Throughput c. Bit rate d. B...

A: Answer: The correct option is (d) Bandwidth

Q: A company wants to have its employees sign a document that details some project-related information ...

A: Explanation of all the given options: a) AUP: AUP stands for Acceptable Use Policies.  It is a comp...

Q: 9.18 A certain computer provides its users with a virtual-memory space of 232 bytes. The computer ha...

A: The size of the virtual-memory is 232 bytes or 4,294,967,296 bytes. The size of the physical memory ...

Q: Which type of address is used at the Transport layer to identify the receiving application? a. IP ad...

A: Answer: The correct option is (b) Port

Q: What service in Windows Server 2016 authenticates remote users and computers to the Windows domain a...

A: Direct Access: It is also known as Unified Remote Access and when it is connected to the network, i...

Q: Use an IPO chart to create the logic for a program that continuously prompts a user for a numeric va...

A: A C program for the given criteria is as follows, File name: “main.c” #include <stdio.h> int p...

Q: number 3 and 4 pls in c++

A: We are providing answer for the third question alone since you haven't submitted the fourth question...

Q: 1. Given that the Lamport hash (see §12.2 Lamport's Hash) value is sent in the clear over the networ...

A: Password  A password is a way to reliably verify the identity of the user, computer, or both. People...

Q: What is the unit of measurement that defines the space available in a rack? How tall are standard ra...

A: Click to see the answer

Q: Run the following C++ program. Assume that user enters these numbers (8,101,46,57). What is the valu...

A: The program prints the value of “counter” which is 332 as its output.   Explanation:   Input: 8 The...

Q: At the Network layer, what type of address is used to identify the receiving host?

A: Network layer: Network layer is used to deliver the messages from source to vital destination. Netw...

Q: Describe using example how excel table can be converted to a range of data

A: To convert and excel table to a range of data follow the steps below: Click on the table. Go to Des...

Q: Which VLAN is designed to support administrative access to networking devices?

A: Virtual LAN is a logical sub group of the Local Area Network (LAN).   Creating a network that is i...

Q: Which kind of multiplexing assigns slots to nodes according to priority and need? a. WDM (wavelength...

A: Statistical Time Division Multiplexing (STDM): Statistical multiplexing is the method where every n...

Q: a. Write a command to change the permission (others can read, owner can write and group members can ...

A: To modify the permissions: 1) The command which is utilized to modify the permissions on files is "c...

Q: which types of program that comes with the operating systems? Explain briefly with any four examples...

A: The type of programs that come with the operating system is known as utility program. These programs...

Q: A hacker takes advantage of an open Bluetooth connection to send a virus to a user’s smartphone. Wha...

A: Security breach occurred by sending a virus to user’s smart phone The security breach that allows t...

Q: Implement the following high-level code segments .Assume the integer variables g ,h ,m ,and r are in...

A: Given that the integer variables g, h, m, and r are stored in registers $s0, $s1, $s2, and $s3 respe...

Q: Databases and Database Users exercise: What is the difference between controlled and uncontrolled re...

A: Difference between controlled redundancy and uncontrolled redundancy:

Q: List some good names for devices on your home network or on the network in your school’s lab. Demons...

A: For home network, the number of devices are less and the network is very small. But if the network i...

Q: When surfing online, you get some strange data on an apparently secure website, and you realize you ...

A: Digital certificate: Digital certificate is a web authentication technology. It is also referred to...

Q: What is the lowest layer of the OSI model at which wired and wireless transmissions share the same p...

A: Network layer: Network layer performs the routing of packet from source to destination. For routing...

Q: Use "Sort" when you need to order data in ascending or descending order.Select one:a. False b. True

A: Sort: - The term sort means to arrange the data in order either in ascending or descending. The data...

Q: Databases and Database Users exercise: Give examples of systems in which it may make sense to use tr...

A: To mitigate the shortcomings of traditional file  processing system,database management system was  ...

Q: Which of the following features is common to both an NGFW and traditional firewalls? a. Application ...

A: Common feature of Next Generation Firewall (NGFW) and traditional firewalls User authentication is ...

Q: What area of a network can provide less stringent security so a web server is more accessible from t...

A: Introduction: Generally, only limited transmissions will take place in the broadcast domains and so...

Q: Use Microsoft Excel with table that contain any numeric data and illustrate how you can do the follo...

A: The following figure will show an excel sheet with numeric data, keeping record of some monthly expe...

Q: Implement the following Booleanfunction with an 4x1multiplexer.F(A,B,C) = ∑(1,2,6,7)

A: Click to see the answer

Q: Which encryption benchmark ensures data is not modified after it’s transmitted and before it’s recei...

A: "Integrity" ensures that the data, which has been sent, is not modified after it gets transmitted on...

Q: Use T flip flops to design a counter with the repeated binary sequence: 0,1,3,5,7. The circuit is to...

A: Excitation table: The excitation table for T flip-flop is as follows:

Q: What virtual, logically defined device operates at the Data Link layer to pass frames between nodes?...

A: Answer: A device that operates at data link layer for transferring the framers between nodes is cal...

Q: Q1. Write a Java program that performs the following steps:  Prompt the user to input two positive ...

A: Hey, since there are multiple questions posted, we will answer first question. If you want any speci...

Q: What field in a TCP segment is used to determine if an arriving data unit exactly matches the data u...

A: Transmission Control Protocol (TCP): TCP refers to an Internet protocol used for exchanging the data...

Q: What characteristic of optical transmissions is primarily responsible for the distance limitations o...

A: The wire is made up of ultra-thin filaments of glass or plastic material that is as thin as human ha...

Q: Write an algorithm that Read data to array. Update data in array. Delete data from array. Retrieve ...

A: NOTE:- Algorithm is a combination of sequential steps to solve a problem. Algorithms are not languag...

Q: Questions: You are expected to generate a password of 8 characters. These characters can be between ...

A: Use a srand() function to create the starting point to generate the random numbers. Declare a string...

Q: Write a function f1 that takes the root of a binary tree as a parameter and returns the sum of the n...

A: “f1 ()” function: The “f1 ()” function for given conditions:  f1 (root r) {             //check root...

Q: What kind of device can be used to configure and manage physical and virtual networking devices acro...

A: SDN controller: A SDN is the Software-defined networking which behaves as a centralized approach t...

Q: ForICE13A, you are asked to build SINGLE OR MULTIPLE LINES of MATLAB code that accomplishes EACH of ...

A: Program code:   % set A A = rand % set B B = 5*rand % set C C = randi(5) % set D D = randi([11 50]) ...