1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marrrta [24]
3 years ago
10

// PrintStrings // Traverse the 2D character array "strings" and print each of the contained strings.// See the example outputs

provided in the word document. Your output should match the example outputs.void printStrings(char strings[NUM_STRINGS][STRING_LENGTH]){}
Computers and Technology
1 answer:
anzhelika [568]3 years ago
6 0

Answer:

C++.

Explanation:

void printStrings(char strings[NUM_STRINGS][STRING_LENGTH]) {

   // Multi dimension array can be traversed through multi-level loops

   for (int i = 0; i < NUM_STRINGS; i++) {

       for (int j = 0; j < STRING_LENGTH; j++) {

           cout<<"<<strings[i][j]<<";

       }

       cout<<endl;

   }

}

Output would be like this, depending on the size of NUM_STRINGS;

"One"

"Two"

"Three"

....

You might be interested in
Write a program that has a user guess a secret number between 1 and 10. Store the secret number in a variable called secretNumbe
Tom [10]

Answer:

Explanation:

The following code is written in Python. It is a function called guessMyNumber and like requested creates a random number and saves it to secretNumber. Then it continuously asks the user for their guess and compares it to the secret number. If the guess is correct it exits the loop otherwise it will continue to ask for a new guess.

import random

def guessMyNumber():

   secretNumber = random.randint(1, 10)

   print(secretNumber)

   while True:

       guess = input("Enter your guess: ")

       guess = int(guess)

       if (guess == secretNumber):

           print("Congratulations you guessed correctly")

5 0
3 years ago
Even with a good protocol, what are some privacy and security challenges while playing battleship on the internet simulator?
sweet [91]
<span>The Internet Simulator “broadcast” every message to every person in the group. Even with a good protocol, there are some privacy and security challenges while playing battleship on the internet simulator. Some of them are:</span><span>
- Broadcast mode allows all users to see all of the moves in plain text
- You do not know exactly who the message came from</span>

3 0
3 years ago
Read 2 more answers
How to read blueprints?<br><br> All answers are appreciated​.​
Katarina [22]

you look at the key and the "structure" or building on the print

5 0
3 years ago
Read 2 more answers
Select all the correct answers.
IgorC [24]

Answer:

I. Improper cable installation.

II. Interference between the signals on cables close to each other.

III. Improper connection of a network cable to the jack

Explanation:

The standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. Thus, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

In this scenario, Mark is unable to connect to the internet or to any of the computers on his network, while nearby computers don’t have this problem. Therefore, the three issues which could be causing the problem are;

I. Improper cable installation: this involves not installing the ethernet cable in the correct destination port.

II. Interference between the signals on cables close to each other: interference usually results in the disruption in network signals.

III. Improper connection of a network cable to the jack: the right connectors such as RJ45 should be used.

6 0
3 years ago
What is what is an example of conversational AI?
taurus [48]

Answer:

a computer answering a medical patient’s question and providing health advice

Explanation:

its the only one that 'talks' back to you

6 0
2 years ago
Other questions:
  • The major difference between a calculator and a computer, when performing calculations, is that a
    14·2 answers
  • Does any body like animal jam
    11·2 answers
  • The mutt software is an example of what type of mail service software on Linux? a. Mail Delivery Agent b. Mail Transport Agent c
    5·1 answer
  • Which of the following code displays the area of a circle if the radius is positive. a. if (radius != 0) System.out.println(radi
    11·1 answer
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page?
    9·1 answer
  • What are two major techniques involved in green computing
    14·1 answer
  • Read the section, "Junior Year." Why would someone chose to complete an apprenticeship after high school? How many occupations c
    14·2 answers
  • Design a 16K x 8 memory using the following ICs:
    13·1 answer
  • What is a text based language that can be used to build all kinds of things ????
    9·1 answer
  • Find examples of conic sections in art and architecture. Visit Web sites to find pictures of artwork or buildings that illustrat
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!