1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rashid [163]
2 years ago
7

9.3 code practice

Computers and Technology
1 answer:
ch4aika [34]2 years ago
5 0

The program is an illustration of arrays; Arrays are variables that are used to hold multiple values of the same data type

<h3>The main program</h3>

The program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   //This declares the array

   int myArray[4][5];

   //This seeds the time

   srand(time(NULL));

   //The following loop generates the array elements

   for(int i = 0; i< 4;i++){

       for(int j = 0; j< 5;j++){

       myArray[i][j] = rand()%(61)-30;

   }    

   }

   //The following loop prints the array elements as grid

   for(int i = 0; i< 4;i++){

       for(int j = 0; j< 5;j++){

       cout<<myArray[i][j]<<" ";

   }    

   cout<<"\n";

   }

   return 0;

}

Read more about arrays at:

brainly.com/question/22364342

You might be interested in
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
Question 12
AlladinOne [14]

Which is a multicast address ?

ans: 241.2.2.1

6 0
2 years ago
Which of the following scenarios might indicate that you have been a victim of identity theft?A)Your credit report displays acco
victus00 [196]

Answer:

Option A is the correct answer for the above question.

Explanation:

A Victim is a person, who faces the problem of a criminal person. Here in the question, the scenario is that a user is a victim of the identity of being theft by some other person. So the user can get known by the help of option a, which suggests that the user's credit card report display something which is not done by him then it can be the scenario, where the user can understand that he is a victim. hence option a is the correct answer where the other option is not because--

  • Option B suggests the user does not pay the bill on time but it is a general case because the bill is paid by the user is in every month not a single time.
  • Option C suggests both options (A and B) are correct, but option b is not the correct.
  • Option D suggests that no option is valid from the above but option A is the correct.
7 0
3 years ago
Component of search engine that indexes web sites automatically. A search engine's __________, copies web page source code into
kherson [118]

Answer:

crawler

Explanation:

A crawler (also known as spider or robot) is a component of search engine that indexes web sites automatically. It's main purpose is to systematically browses the World Wide Web, typically for the purpose of Web indexing.

It does this by visiting a list of linkss, as it does this it identifies all the hyperlinks found in the web pages and copies and saves them to the list of links to visit.

8 0
3 years ago
1. Name the program in which you can draw and colour pictures.​
babymother [125]

Answer:

Photoshop- if this is for school I THINK, but I use Procreate for IOS

Explanation:

4 0
3 years ago
Other questions:
  • Sending a employee an email with important criticism represents a problem which communication process
    9·1 answer
  • Which of the following is a list of input devices?
    11·1 answer
  • Hat is the purpose of the domain name?
    7·2 answers
  • From Blown to Bits why is it important to know what children are doing on the Web Tonight?
    7·1 answer
  • Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the a
    6·1 answer
  • Define a function called 'findWordFreq, which takes two parameters. The first parameter, 'text" is an nltk.text.Text object and
    8·1 answer
  • second question today 25 POINTS: What is the formula to balance a lever when both effort and resistance are present?
    14·1 answer
  • Match the following pls help
    5·1 answer
  • Type of Factor Beginning Frog Count Simulation 1 (Low) Simulation 2 (High)
    13·1 answer
  • Creating a wedding website on the knot- how to make the text wide
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!