The variables which can be accessed by all modules in a program, are called A. local variables B. internal variables C. external variable D. global variables
Q: What is the maximun number of dimensions an array in C may have? A. Two B. Eight C. Twenty D.…
A: D. Theoretically no limit. The only practical limits are memory size and compilers.
Q: In this c++ program please create a flowchart..
A: Flow chart is a sequence of instructions which are connected using flows. In this flow chart…
Q: Analyze the advantages and disadvantages that come along with using different languages, and compare…
A: Start: should be aware of the positives and negatives associated with the use of other languages.…
Q: topology requires a multipoint connection. Select one: O a. Mesh O b. Ring O c. Star O d. Bus
A: Mesh topology requires a multipoint association. Multipoint association is utilized in BUS Topology.…
Q: Provide some instances of both software quality assurance and software engineering, as well as…
A: Introduction To ensure the program's quality, we use a method called as software quality assurance…
Q: The length & breadth of a rectangle and radius of a circle are input through the keyboard. Write a…
A: As given, we need to write a C program that takes length & breadth of a rectangle and radius of…
Q: Is it beneficial for programmers who already have experience in a variety of programming languages…
A: The solution to the given question is: INTRODUCTION Programming Language Programming languages are…
Q: 24/ Fill with the blank for any three of the follo 1: The function has output(s), while the…
A: 1. The function has one output while the subroutine has two outputs
Q: ity assurance process for software, and how does the process itself function?
A: What is the role of quality assurance? Software quality assurance (SQA) is the area of creation…
Q: What aspects of programming are distinct from scripting, and how do these differences come about?
A: Difference between scripting language and programing language.
Q: Describe the system support and security portion of the process.
A: Here we have give a brief note on system support and security portion of the process. You can find…
Q: If arr is a two dimensional array of 10 rows and 12 columns, then arr (5) logically points to the…
A: Array index starts from zero
Q: The development of the suggested solution only for problems with information technology security
A: Information technology is defined as the user computers, physical devices, infrastructure, store,…
Q: If n has the value 3, then the statement a [++n] = n++ ; A. assigns 3 to a [5] B. assigns 4 to…
A: post increment:- value is incremented later ,first assignment is done. Pre increment:- First value…
Q: 1- Expand the Dijkstra algorithm to generate the shortest paths with its lengths. 2- Find the…
A: Dijkstra's algorithm finds the shortest path between a particular node, called the source node, and…
Q: Explore the issues that data systems encounter via the use of technology and data.
A: Data Challenges include the best way of handling the numerous amount of data that involves the…
Q: How can scripting languages be differentiated from programming languages, and what exactly is the…
A:
Q: Q: FIND the control word for OR A.C Your answer CW=?
A: We need to find control word for given operation.
Q: 34. Which of the following statements is/are true? I. II. A. B. Given a rooted tree that includes…
A: The correct solution is given below in the next steps with explanations behind choosing the correct…
Q: Throughout the whole of the analytical process, the requirements of the system were evaluated using…
A: Introduction This project management strategy is all the rage at the moment. Since the business…
Q: # and viapplication the user will be able to choose whether to buy a car or not. if user chooses to…
A: Answer:
Q: The following program main( ) { static int a[ ] = { 7, 8, 9 } ; printf( "%d", 2[ a ] + a[ 2 ] ) ; }…
A: We are given a program and asked which option is correct. Given program is in C programming…
Q: Passing parameters rather than utilising a global variable in a C programme has both benefits and…
A: The Many Benefits of Utilizing Passing Parameters: The value of any local variables that have been…
Q: What are the most important parts of the operating system, please? To put it simply:
A: Several computer system components rely on the components of an operating system to function…
Q: What steps should be taken by organisations in the event of a breach in security
A: Answer:
Q: an anonymous block that returns the number of students in a section. Prompt for section id. Name the…
A: It is defined as a compound statement that is a lexical structure of source code which is grouped…
Q: In OSI model, addressing and routing functions of the system are provided by Select one: O a.…
A: Please refer to the following step for the complete solution to the problem above.
Q: 1. Compare and contrast risks and assaults in information security. To back up your claim, provide…
A: Security of Information 1. Compare and contrast threats and attacks. Give instances that…
Q: Limurians live on the planet Lemuria where the passage of time is measured in lims (days), limhas…
A: Algorithm of limurian_age.py file : Declare variables according to the number of days lived by…
Q: Define the risk from the perspective of the network/OS system? Also, what are some real-world…
A: A network operating system is a version of Windows designed specifically for network devices such as…
Q: Distinguish the significance of firewalls in ensuring the safety of computer networks and online…
A: A firewall is defined as the network security which is monitoring and filtering the incoming and…
Q: What are your opinions on the idea of computing done via the internet using cloud storage? I'm…
A: Cloud computing: Cloud computing is the on-demand access of PC framework assets, such as data…
Q: Distinguish between method overloading and method overriding and how they are similar and different.
A: Method overloading In the program, If the class have same name but different parameters then it is…
Q: In this video, I'll explain why I feel that people and information systems are the primary forces…
A: SUMMARY: Consequently, all issues were considered. The Information System A system of components…
Q: Make a C program to create a nxn square matrix. Output the sum of the Upper Triangular matrix. Upper…
A: Answer:
Q: There is no difference between an array of even numbers and a list of paragraphs returned by…
A: There is no difference between an in the array of even numbers and an array of paragraphs that was…
Q: Keep track of any databases that may include your personal information. How long will you be able to…
A: A database - (DB) is a group of data that has been put together to make it easy to access and keep…
Q: If an unintegrated information system is used, what may go wrong?
A: Failure and loss of computers are key computer issues that lead to excessively high expenditures and…
Q: Shouldn't a succinct overview of the two components that the majority of people say are the most…
A: An operating system-OS is software that manages and controls computing devices such as smartphones,…
Q: What are some of the elements that should be included in a comprehensive strategy for cyber…
A: In this question we have to discuss What are some of the elements that should be included in a…
Q: Minimum number of interchange needed to convert the array 89,19,40,14,17,12,10,2,5,7,11,6,9,70, into…
A: maximum element at root means the array has to be converted into a Max-Heap. In max-heap, the value…
Q: In computer security access control, distinguish between groups and roles.
A: To provide access to authorizations main database or secure resources is basically computer security…
Q: array1]-(1, 2, 3, 4, 5); array2]- (3, 5, 2, 10, 16, 1, 10, 15); Write a code to display the…
A: Given :
Q: Talk about whether a system can function properly in the absence of system calls. Is there a good…
A: Operating system: It is a link between the user and the hardware of the device. It is a system…
Q: Assume x, y and z are integer variables with x = 2, y = 5 and z= 10. Each expression is independent.…
A: Note : As per guidelines we are authorized to answer 1st 3 subparts when multiple subparts question…
Q: Describe the idea of an authentication challenge–response system. A password-based approach is not…
A: In the challenge response authentication protocol ,one entity sends a challenge to another entity…
Q: Could you provide give a brief overview of the operating system's major components? Essentially…
A: The components of an operating system are the critical in making the computer system portion operate…
Q: A request that cannot be satisfied in the cache is issued by the processor while the write buffer…
A: Given So, what exactly should happen when a processor delivers a request that is not fulfilled in…
Q: In this video, I'll explain why I feel that people and information systems are the primary forces…
A: Please find the answer below :
Q: If the marks obtained by a student in five different subjects are input through the keyboard, find…
A: #include<stdio.h>int main(){ float sub1,sub2,sub3,sub4,sub5; float total,…
A. | local variables |
B. | internal variables |
C. | external variable |
D. | global variables |
Step by step
Solved in 2 steps
- Most of the memory locations declared in an application should be class-level variables. a. True b. FalseIn the code below, why is it that the displayName() module cannot print the person’s name?Start Call getInput() Call displayName()StopModule getInput() Declare String name Display "Enter your name: " Input nameEnd ModuleModule displayName() Display "Your name is: " + nameEnd ModuleDevelop a flowchart or develop pseudocode that will design an application for Bob’s E-Z Loans. Input: client's account number, client's loan amount, monthly payment amount Processing: After the monthly payment is made, a finance charge of 1 percent is added to the balance to calculate the new loan balance. Output: client’s account number, the word "Month" and the month number (Month 1, Month 2, Month 3 etc.) and the new loan balance. Create a loop in the detail module to output the information for each month as long as the loan balance is greater than 0. You will need a counter (month) which you would increment each time through the loop for the month number. Once the balance is zero or less, return to the main program logic to check to see if there is another client to process (end of file test). If so, control would pass back to the detail module to process the next client. Decide on a sentinel value to end the program. You could check the client number for -99 which indicates…
- PYTHON HOMEWORK QUESTION def area(side1, side2): return side1 * side2 s1 = 12s2 = 6 Select all statements that correctly call the area function. A. answer = area(s1,s2)B. print(f'The area is {area(s1,s2)}')C. area(s1,s2)D. result = area(side1,side2)C++ Visual Studio 2019 Instructions Complete #7. This is dependent of your completing MathStack within the chapter. Please submit just one file for the classes and main to test the classes. Just create the classes before main and submit only one cpp file. Do not create separate header files.Which variable determines the amount of computational instructions needed by each statement in the source code?
- ind the error in the following pseudocode.Module main()Declare Real mileageCall getMileage()Display "You've driven a total of ", mileage, " miles."End ModuleModule getMileage()Display "Enter your vehicle's mileage."Input mileageEnd ModuleComplete this program in C++ Objective: Create a Handball 1. Make 2 Paddles and a ball load into the screen 2. the 2 paddles must move up and down with seperate keyboard commands (diffrent command for each of the 2 players) 3. the ball must bounce around the screen 4. the ball must bounce off the paddles at different angles 5. there must be a score text located on the screen that keeps track of the number of misses each player has 6. Display the winner (player with least number of misses) onto the screen after 21 triesDesign program that prompts the user for a refrigerator model name and interior hieght, width, and depth in inches. Calculate the refrigerator capacity in cubic feet. Program accepts model names continuously until "XXX" is entered. use named constants where appropriate. Use modules, like " end of job" after the sentinel is entered for the model name. I need to do this using Flowgorithm.
- A variable’s __________ is the time period during which the variable exists in memory while the program is executing. a. lifetime b. run time c. time to live d. half lifePuTTY/Ocelot Assignment #2 Instructions: (using C language in the UNIX environment, Systems Programming) Through this programming assignment, the students will learn to do the following: Usage: mortgagepmt [-s] -r rate [-d downpayment] price In this assignment, you are asked to perform a mortgage payment calculation. All information needed for this will be passed to the program on the command line. There will be no user input during the execution of the program You will need a few pieces of information. The price of the home and the amount of the down payment. You will also need to know the interest rate and the term of the mortgage. To figure your mortgage payment, start by converting your annual interest rate to a monthly interest rate by dividing by 12. Next, add 1 to the monthly rate. Third, multiply the number of years in the term of the mortgage by 12 to calculate the number of monthly payments you'll make. Fourth, raise the result of 1 plus the monthly rate to the…DAT6 The only allowed external libraries/functions are: stdio.h: > printf() > scanf() Please use Visual Studio Code and C programming language.