1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kati45 [8]
3 years ago
6

For the following array x [10] = { 45, 20, 50, 30, 80, 10, 60, 70, 40, 90} show the contents of x after the function call split

Pos = split(x, 0, 9) is executed, and give the value of the array index splitPos (the first is the pivot).
Computers and Technology
1 answer:
Valentin [98]3 years ago
5 0

Answer:

The array index by using split function.

45 20 50 30 80 10 60 70 40 90

45 20 40 30 80 10 60 70 50 90

45 20 40 30 10 80 60 70 50 90

10 20 40 30 45 80 60 70 50 90

Explanation:

In the following statement, there is an integer array type variable x and its index value is 10 that means it contains only 10 numeric values and then, they set split function which split the array and the split function is the built-in function which is used to separate the string or an array. So, the array is split into the following parts.

You might be interested in
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
lesya692 [45]

Answer:

True

Explanation:

In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.

8 0
3 years ago
When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be ____ to t
Katen [24]

Answer:

Incidental.

Explanation:

When a computer or digital device is used as a storage device or in the facilitation of an offense, it is argued to be incidental to the offense.

For instance, the list of customers used by human traffickers is considered to be generated through an incidental system.

8 0
3 years ago
The first mechanical computer design in by Charles Babbage was Called​
White raven [17]

Answer:

<h2>Analytical Engine</h2>

Explanation:

Analytical Engine, generally considered the first computer, designed and partly built by the English inventor Charles Babbage in the 19th century (he worked on it until his death in 1871).

7 0
3 years ago
Read 2 more answers
Before becoming romantically involved with a coworker you should
astra-53 [7]
You should make sure no one is looking and make sure you have protection
7 0
3 years ago
Read 2 more answers
What are the benefits of using presentations to organize and deliver information?
bearhunter [10]
Hello.

The benefits of using presentations to organize and deliver information are: it keeps things in order, keeps peoples attention longer, and it looks more professional.
4 0
3 years ago
Other questions:
  • A commonly used font style is _____. superscript periwinkle times new roman point
    7·1 answer
  • Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
    7·1 answer
  • Write the definition of a function half , which receives an integer parameter and returns an integer that is half the value of t
    7·1 answer
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • People are able to predict future events to some extent because: (Select all that apply)
    11·1 answer
  • What percentage of business are using social media today
    14·1 answer
  • If the algorithm does not have instructions for unanticipated results, the computer program will
    15·1 answer
  • In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyon
    10·1 answer
  • What does the following code print?
    15·1 answer
  • Help me please with this
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!