1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
2 years ago
6

Design and implement a structured program for manipulating arrays data structures, as follow:

Computers and Technology
1 answer:
tekilochka [14]2 years ago
6 0

#include <stdio.h>

struct student {

char firstName[50];

int roll;

float marks;

} s[5];

int main() {

int i;

printf("Enter information of students:\n");

// storing information

for (i = 0; i < 5; ++i) {

s[i].roll = i + 1;

printf("\nFor roll number%d,\n", s[i].roll);

printf("Enter first name: ");

scanf("%s", s[i].firstName);

printf("Enter marks: ");

scanf("%f", &s[i].marks);

}

printf("Displaying Information:\n\n");

// displaying information

for (i = 0; i < 5; ++i) {

printf("\nRoll number: %d\n", i + 1);

printf("First name: ");

puts(s[i].firstName);

printf("Marks: %.1f", s[i].marks);

printf("\n");

}

return 0;

}

#◌⑅⃝●♡⋆♡Nåmřāthā ♡⋆♡●⑅◌

You might be interested in
(PLATO) How can hackers obtain a person’s data? Malicious hackers can obtain a person’s data through the method of simple ___ en
EastWind [94]

The missing word here is social.

Social engineering involves using simple human methods to steal data, such as looking through peoples’ drawers for pieces of paper on which they might have written down passwords, or perhaps sneaking a look at the keys you press while walking past your desk as you are typing your password. Such behaviors designed to steal your personal information are methods of social engineering.

Let me know if you have any questions.

5 0
3 years ago
Which of the following is a safe work practice to protect you from electrocution hazards?
Flura [38]
What are the answer choices?
7 0
3 years ago
Help me please, I'm begging you
wel

Answer: 7 math 8 many

Explanation: it makes sense

5 0
3 years ago
2. You turn on your Windows 7 computer and see the system display POST messages. Then
Anton [14]
The monitor would definitely be the problem in this scenario.
7 0
3 years ago
Higher resolution images mean they can be enlarged better, <br> True or false
ella [17]

Answer:

False

Explanation:

High resolution just mean It looks better

6 0
3 years ago
Read 2 more answers
Other questions:
  • It takes an older computer twice as long to send out a company's email as it does a newer computer. Working together, it takes t
    15·1 answer
  • Which strategy are you using when you only read the title, section headings, and captions?
    12·2 answers
  • Which of the following is a typical concern for developers while using prototypes?
    6·2 answers
  • . Write a function called is_sorted that takes a list as a parameter and returns True if the list is sorted in ascending order a
    14·1 answer
  • Is there a relationship between cybercrime and traditional crime?
    6·1 answer
  • A lack of financial literacy can cause you to lose your
    10·1 answer
  • Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
    12·1 answer
  • HELP ASAP!!!
    7·1 answer
  • 5. Robotics deals with the design, construction, operation, and use of robots, as well as computer systems for their control, se
    14·1 answer
  • Which of the following is typiacally the last step of the mail merge process
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!