1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brilliant_brown [7]
3 years ago
7

Return 1 if ptr points to an element within the specified intArray, 0 otherwise.

Computers and Technology
1 answer:
Paladinen [302]3 years ago
4 0

Answer:

int withinArray(int * intArray, int size, int * ptr) {

      if(ptr == NULL) // if ptr == NULL return 0

            return 0;

      // if end of intArr is reached

      if(size == 0)

          return 0; // element not found

  else  

          {

            if(*(intArray+size-1) == *(ptr)) // check if (size-1)th element is equal to ptr

                   return 1; // return 1

            return withinArray(intArray, size-1,ptr); // recursively call the function with size-1 elements

         }

}

Explanation:

Above is the completion of the program.

You might be interested in
Writing queries in sql to compile data from a database is related to the physical level of databases true or false?.
k0ka [10]

Writing queries in sql to compile data from a database is related to the physical level of databases is a false statement.

<h3>What does writing queries mean?</h3>

A “query” is known to be a term that is said to serve as a question or a form of an inquiry  or letter of such.

Note that this is one that is said to be written or in a form that can be said to be a printed communication that is often used to addressed  a person or organization.

Therefore, Writing queries in sql to compile data from a database is related to the physical level of databases is a false statement.

Learn more about Writing queries from

brainly.com/question/19260708

#SPJ1

8 0
2 years ago
What are authorization rules?
nasty-shy [4]
An authorization rule specifies the policy that applies to an object and that is based on various conditions, such as context and environment. Each authorization rule has a unique name and can be applied to multiple objects in a domain.
8 0
2 years ago
1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web a
Ivan

Answer:

1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses.  Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.

Explanation:

2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address  issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.

8 0
3 years ago
Dot Notation can be used with lower(), upper() or str() string methods. true or false
Akimi4 [234]

Answer:

The answer is "True".

Explanation:

Dot notation is a part of the programming language. This notation includes Python and other oops language to look in front of the point to execute code.

  • This may access the specific version of a specific function, which is specified in a different class or section, using dot notation.
  • This notation is used with a String method or string object that is immutable. This means that after constructing, they can not be modified.
  • To access any member of an object we use dot notation. That's why this statement is true.

4 0
3 years ago
Type the correct answer in the box.
mr Goodwill [35]
The term used for the disturbance of communication between sender and receiver is called noise.
The noise usually happens when the message is in transmission.
7 0
2 years ago
Other questions:
  • How do Filament 3D printers build a model?
    8·1 answer
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Helping people keep track on things is the purpose of_____ A database B table C query D form​
    12·1 answer
  • This device is used to connect sections of large networks?
    12·2 answers
  • Sophisticated modeling software is helping international researchers ________.
    15·1 answer
  • Which of the following defines code?
    7·1 answer
  • 2) A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long
    7·1 answer
  • PLEASE ANSWER QUICK
    13·2 answers
  • Which will touch the ground first an elephant or a rock?
    9·2 answers
  • Which family does Ms word 2007 belongs to?​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!