1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
1 year ago
12

modify hw 02 c.c to use envp instead of environ. be sure that you understand how the code works. provide liberal comments to exp

lain what your pointer arithmetic is computing. paste your source code for this into your answer document. also, answer the following questions and explain your answers:
Computers and Technology
1 answer:
rjkz [21]1 year ago
4 0

With the aid of pointer-based arithmetic operations and the usage of pointers in comparison operations, address arithmetic is a technique for determining the address of an object. Pointer arithmetic is another name for address arithmetic.

The pointers can be used for mathematical operations like addition, subtraction, etc. The outcome of an arithmetic operation on the pointer, however, will likewise be a pointer if the other operand is of type integer because we know that the pointer includes the address. These operations are addition and subtraction. In C++, a pointer's value can be increased or decreased. It signifies that we can change the pointer's value by adding or removing integer values. A pointer arithmetic can be subtracted (or added) from another in a manner similar to this.

Learn more about arithmetic here-

brainly.com/question/11424589

#SPJ4

You might be interested in
The order of precedence is very important when building formulas in Excel. Which of the following formulas will produce 778 as t
kvv77 [185]
=(25*(27/9)+5+309)*2*7
5 0
3 years ago
When installing a device driver, start the computer in
KiRa [710]
Dont shut it down. install it then wait 5 minutes then restart your computer.
3 0
3 years ago
Please conduct some research and find an article on Security Threats and please provide link of the article.
finlep [7]

Answer:

There are Security Threats happening every other day in the world. Some are minor while others can catastrophic.

Explanation:

There are also many types of <u>Security Threats</u>, <u>Breaches</u>, and <u>Hacks</u> in the world of IT. Each with their own Security Measures. Below are two links about this topic. The first link is an article about 5 of the worst corporate Security Breaches/Hacks to have taken place. While the second link is an article about the Top 10 Network Security Threats.

https://abcnews.go.com/Technology/marriotts-data-breach-large-largest-worst-corporate-hacks/story?id=59520391

https://securitytrails.com/blog/top-10-common-network-security-threats-explained

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
A computer has a word length of 8 bits (including sign). if 2’s complement is used to represent negative numbers, what range of
iVinArrow [24]
Two's-complement notation can represent all integers from - 2^(N-1) to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -128 to 127 inclusive. 

<span>One's-complement notation can represent all integers from - 2^(N-1) - 1 to 2^(N-1) - 1, where N is the word length of the computer. So, in your example, the computer could store all integers from -127 to 127 inclusive</span>
5 0
3 years ago
Imagine you accidently mistype the URL for your bank and you are redirected to a fake website that collects your information. Wh
fgiga [73]

Answer:

Financial identity theft

Explanation:

Financial identity theft is a fraudulent act that involves accessing someone's personal information without their consent or approval for fraudulent financial gain.

A typical financial identity theft is someone stealing your credit card information such as pin, cvv, etc. to make other financial transactions without your knowledge.

7 0
3 years ago
Other questions:
  • Why is it important to verify a customer complaint?
    6·1 answer
  • A ________ restricts the number of a certain type of product that can be imported into a country.
    5·1 answer
  • Convert (35.125)10 to binary
    9·1 answer
  • Big films with big budgets typically have a few animators working on them. True False
    11·1 answer
  • Use the drop-down menus to complete each sentence about the layers of the atmosphere.
    14·2 answers
  • (1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term e
    10·1 answer
  • I had tried to turn on Linux on the Chromebook but it's not working
    11·2 answers
  • Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using
    15·1 answer
  • Helppppppppppp please
    5·2 answers
  • What is the answer ????​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!