1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naily [24]
3 years ago
7

You are given two int variables j and k, an int array zipcodelist that has been declared and initialized, and an boolean variabl

e duplicates. write some code that assigns true to duplicates if any two elements in the array have the same value, and that assigns false to duplicates otherwise. use only j, k, zipcodelist, and duplicates.
Computers and Technology
1 answer:
Snezhnost [94]3 years ago
4 0
Duplicates = false;

for( j = 0; j < zipcodelist.length -1; j++ )
{
    for( k = j + 1; k < zipcodelist.length; k++ )
    {
         if( zipcodelist[ j ] == zipcodelist[ k ] )
         {
             duplicates = true;
             break;
         }
    }
}
You might be interested in
What are the advantage of transistors over vacuum tubes?
marusya05 [52]

Answer:

Transistors are comparatively cheaper and consume less power as compared to vacuum tubes.

Explanation:

Transistor when compared to vacuum tubes perform much faster processing, are small and lightweight which enables it to integrate them into circuits.

They also show a high amplification factor than vacuum tubes.

7 0
3 years ago
What is the best way to appeal to an audience in any medium ?
BigorU [14]

Answer:

I think it's D

Explanation:

The best way to appeal is with emotions

8 0
3 years ago
The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet:
vodka [1.7K]
The answer is Cybercrime.  <span>The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet is called Cybercrime.  </span><span>Common types of </span>cybercrime<span> involve hacking, online scams and fraud, identity theft, etc.</span>
7 0
4 years ago
You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a d
coldgirl [10]

You have an application deployed in Oracle Cloud Infrastructure running only in the Phoenix region. You were asked to create a disaster recovery (DR) plan that will protect against the loss of critical data. The DR site must be at least 500 miles from your primary site and data transfer between the two sites must not traverse the public internet. The recommended disaster recovery plan is

<u>A. Create a new virtual cloud network (VCN) in the Phoenix region and create a subnet in one availability domain (AD) that is not currently being used by your production systems. Establish VCN peering between the production and DRsites.</u>

<u></u>

Explanation:

  • Local VCN peering is the process of connecting two VCNs in the same region and tenancy so that their resources can communicate using private IP addresses without routing the traffic over the internet or through your on-premises network.
  • You have a central VCN that has resources that you want to share with other VCNs.
  • A VCN is a customizable private network in Oracle Cloud Infrastructure. Just like a traditional data center network, a VCN provides you with complete control over your network environment.
  • A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP network into multiple, smaller network segments.
  • A VCN resides in a single Oracle Cloud Infrastructure region and covers a single, contiguous IPv4 CIDR block of your choice.

4 0
3 years ago
In Linux, the /etc/inittab file describes the processes that are started up during boot up. Each entry in the /etc/inittab file
Softa [21]

Answer:

The answer is "Action".

Explanation:

The directory /etc/inittab file is also known as a configuration file that is used by the System V (SysV) initialization system in Linux. where System V stands for system version that is used for Unix and Linux both. It was developed in AT&T. This configuration file includes three items that are:

  • Runlevel norm
  • Which procedures should you begin, track and restart when you end?
  • Which actions to perform when a new run level is introduced?

Example: id:runlevels:action:process

  • id stands for identification code. It includes a sequence of one to four characters that identify in function.
  • runlevels it is a list that runs on levels in which this applies.
  • action is a specifies code in the field that describes to init how to run the process.  
  • A process is a command that is ready to execute.
3 0
3 years ago
Other questions:
  • The following code in a different program is not working properly. The message should display the value of the intCounter variab
    14·1 answer
  • Java languageThe cost to ship a package is a flat fee of 75 cents plus 25 cents per pound.1. Declare a constant named CENTS_PER_
    5·2 answers
  • Write down the complete procedure for creating ExcelSheet.
    8·1 answer
  • How do you adjust the shear of a shape?
    10·2 answers
  • Three healthcare firms jointly own and share the same cloud resources to meet their computing needs. Which cloud model does this
    15·1 answer
  • • Two advertisers A and B
    8·1 answer
  • Write a program that declares constants to represent the number of inches, feet, and yards in a mile. Name the constants INCHES_
    6·1 answer
  • You can perform an in-place upgrade to Windows 7 from both Windows XP and Windows Vista
    10·1 answer
  • Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new vi
    13·1 answer
  • In a mobile app for computer technicians in a large college, an initial trigger event could be ____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!