1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
2 years ago
13

I need help on this, need answer asap.

Computers and Technology
1 answer:
FinnZ [79.3K]2 years ago
6 0

Answer:

int main() {

int _2dArray[32][32];

for (int i = 0; i < 32; i++) {

 for (int j = 0; j < 32; j++) {

  _2dArray[i][j] = j + i * 32;

 }

}

return 0;

}

Explanation:

Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.

Good luck!

You might be interested in
A game developer is purchasing a computing device to develop a game and recognizes the game engine software will require a devic
ale4655 [162]

Answer: Server

Explanation:

Options include:

A.Laptop

B.Server

C.Game console

D.Workstation

A server is referred to as a computer that helps in the provision of services, data or resources to other systems over a particular network.

Since the game developer wants a computing device to develop a game and recognizes the game engine software will require a device with high-end specifications that can be upgraded, the server is the best option for this.

5 0
2 years ago
You notice that lately your computer has been running slow. When you open up your web browser, you get endless pop-up ads to the
Vlad [161]

Answer:

Spyware

Explanation:

The reason why you noticed your computer has been running slow is because of spyware, which is considered to be very bad to get on your computer. When a user opens his/her web browser, the user receives ads that are misleading to the user, which fools the user of thinking it's something real and not a scam. Not only that, the user also receives pop-up ads that can, as mentioned, trick the user to think that it's real and not fake. Finally, the user's search results will be manipulated. In conclusion, spyware is, in fact, the main cause of the scenario.

4 0
3 years ago
What is considered necessary to establish OSHA
irakobra [83]
OSHA (the Occupational Safety and Health Administration) is a part of the US Department of Labor that establishes, issues, and enforces national workplace safety regulatio…ns. These are designed to make job areas and practices safer for US workers.
4 0
3 years ago
"You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per
pickupchik [31]

Answer:

Ask her to get a genuine software

Explanation:

if i will install, it can cause the following problems:

1. Prated software makes your system Vulnerable to the security attacks because the activities of the software are not monitored by any organization and no one is responsible for anything bad happened to your system.

2. It may stop working anytime because there would not be maintenance patches available for it so that it can work properly.

3. It cannot be updated and may cause problems in core functionalities of it.

4.Serious legal actions can be taken against anyone using them because  economy has drastic decrease due ti use of it.

7 0
3 years ago
What two actions does the RETI instruction perf orm? Why must these two actions be done in a single instruction, as opposed to a
Bas_tet [7]

Answer:

In assembly language, two instructions control the use of the assembly language procedure.

  • CALL
  • RET

CALL pushed the control to the return address onto the stack and transferred the control.

RET instruction returns the address that placed on the stack by a call instruction.

Explanation:

Action RET instruction

  • The RET instruction pops the address and returns off the stack, which is pointed by the stack pointer.
  • The stack is LIFO in memory at a particular location, and the pointer points offset from the stack location.

RET instruction does its job by consulting the register and memory state at the point when it is executed.

In RET instruction, only register and memory state is executed. Call instruction must save that address that figure out in a register and memory location.

5 0
3 years ago
Other questions:
  • Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
    5·2 answers
  • 2. What are the pros and cons of Toyota structure?
    13·1 answer
  • A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
    14·1 answer
  • What was the technology that defined each of the four generations of computers?
    12·1 answer
  • When does information become a liability for an organization
    6·1 answer
  • In confirmatory visualization Group of answer choices Users expect to see a certain pattern in the data Users confirm the qualit
    9·1 answer
  • 1. Which sentence best expresses the main idea
    12·1 answer
  • A list is sorted in ascending order if it is empty or each item except the last one is less than or equal to its successor.
    14·1 answer
  • Need help:(!!!! I’ll mark brainliest if correct
    5·1 answer
  • C#
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!