Method explanation:
- Defining a method "changeCharacter" that takes three parameters that are "character array", and two integer variable "s, k" in its parameters.
- Inside the method, a for loop is declared that takes array value and defines a conditional statement that checks the 3rd character value in the array, is used to the array that holds its key-value.
- Please find the full program in the attachment.
Method description:
void changeCharacter(char* ar, int s, int k)//defining a method changeCharacter that takes three parameters
{
for(int j = 1; ar[j]!='\0'; j++)//defining a for loop for 3rd character value in array
{
if(j%3== 0)//use if block that check 3rd character value in array
{
ar[j-1] = k; //Changing the 3rd character in array
}
}
}
Learn more:
Program: brainly.com/question/12975989
Answer:
d. Data reader, Data Adapter
Explanation:
Data Reader statements are used to sequentially read streams of data from a database into a program.
It provides an easy way to read data from a data source or database in a one way direction.
Data Adapter:
DataAdapter is an object used in a disconnected data environment and can be seen as a link between a data sourc and this disconnected data class.
It clearly identifies commands, brings data from the database and then populates these data in the data set.
An example of their usage in Microsoft Visual C# (winforms) is
SqlConnection connect = new SqlConnection ("connection string");
connect.Open();
SqlCommand command = new SqlCommand("SQL Query", connect);
SqlDataReader reader = command.ExecuteReader();
.....
.........
Data Adapter
SqlConnection connect = new SqlConnection ("connection string");
connect.Open();
SqlDataAdapter adapter = new SqlDataAdapter("SQL Query", connect);
DataSet dset = new DataSet();
adapter.Fill(dset);
........
............
Answer:
The correct answer to the following question will be Option D (a worm).
Explanation:
A PC worm seems to be a form of harmful, self-replicating software that often infects other machines while remaining onto corrupted devices.
- Worms may often go overlooked before their excessive propagation cycle utilizes machine resources, stopping the encrypted file as well as slowing it down.
- The virus is quickly spreading inside the company's servers leading the server or computer to fail.
The other three options are not related to the given scenario. So that Option D is the right answer.
Answer:
C or D
Explanation:
If he has previous experience, C might be better answer, otherwise, D is right.
not sure with my answer either lol
The following file format of inv_nbr, inv_name, inv_cost is called delimited format.
<h3>What is a delimited file in Excel?</h3>
The term "Delimited" is known to be a term that connote a form of an TXT file that tends to make use of tabs or an CSV file that uses commas to be able to separate and group your data.
Note also that a delimited file is seen as a form of a given sequential file that is made up of column delimiters.
Therefore, The following file format of inv_nbr, inv_name, inv_cost is called delimited format.
Learn more about text format from
brainly.com/question/16397886
#SPJ1
Multiple Choice
fixed-width format
extensible markup
delimited format
hypertext format