1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
12

Finish and test the following two functions append and merge in the skeleton file:

Computers and Technology
1 answer:
avanturin [10]3 years ago
4 0

Answer:

Explanation:

#include <iostream>

using namespace std;

int* append(int*,int,int*,int);

int* merge(int*,int,int*,int);

void print(int*,int);

int main()

{ int a[] = {11,33,55,77,99};

int b[] = {22,44,66,88};

print(a,5);

print(b,4);

int* c = append(a,5,b,4); // c points to the appended array=

print(c,9);

int* d = merge(a,5,b,4);

print(d,9);

}

void print(int* a, int n)

{ cout << "{" << a[0];

for (int i=1; i<n; i++)

cout << "," << a[i];

cout << "}\n";

}

int* append(int* a, int m, int* b, int n)

{

int * p= (int *)malloc(sizeof(int)*(m+n));

int i,index=0;

for(i=0;i<m;i++)

p[index++]=a[i];

for(i=0;i<n;i++)

p[index++]=b[i];

return p;

}

int* merge(int* a, int m, int* b, int n)

{

int i, j, k;

j = k = 0;

int *mergeRes = (int *)malloc(sizeof(int)*(m+n));

for (i = 0; i < m + n;) {

if (j < m && k < n) {

if (a[j] < b[k]) {

mergeRes[i] = a[j];

j++;

}

else {

mergeRes[i] = b[k];

k++;

}

i++;

}

// copying remaining elements from the b

else if (j == m) {

for (; i < m + n;) {

mergeRes[i] = b[k];

k++;

i++;

}

}

// copying remaining elements from the a

else {

for (; i < m + n;) {

mergeRes[i] = a[j];

j++;

i++;

}

}

}

return mergeRes;

}

You might be interested in
What is the command to disable any Processes in linix??
stiks02 [169]

Answer: killall[process_name]  or kill[PID]

Explanation:

Killall is a tool for disabling running processes on the system. It will disable all programs that matches the name mentioned.

kill disables processes based on process id numbers. it does not disable the process directly. The process recieves a signal where the process will follow instructions which it has to follow if it receives the signal.

7 0
3 years ago
What are work incidents/situations or ethical problem?<br>​
777dan777 [17]

5 Common Ethical Issues in the Workplace

Unethical Leadership.

Toxic Workplace Culture.

Discrimination and Harassment.

Unrealistic and Conflicting Goals.

Questionable Use of Company Technology.

7 0
3 years ago
Read 2 more answers
NO LINKS OR I WILL DELETE YOUR FORTNITE ACCOUNT
ozzi

Answer:

can i have ur fortnite account if u hav one and dont use it :) i only say that cuz u mentioned fortnite

Explanation:

with the free version you can add effects (cheap effects) cut the video, crop some parts. and posting leaves a watermark until u buy money

5 0
3 years ago
How did domestication of maize make the city of tenochtitlan possible?
umka21 [38]

The farming of maize began in Mesoamerica in 6000 B.C. The domestication of maize made the city of Tenochtitlan possible by providing the Aztecs the ability to feed millions. Unlike the corn that is known today, the early maize had tiny cobs but dramatically became bigger and more nutritious as time passed.


3 0
3 years ago
Read 2 more answers
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
grandymaker [24]

Answer:

No.

Explanation:

This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.

The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.

8 0
3 years ago
Other questions:
  • One of the earlier applications of crypto-graphic hash functions was the storage of passwords to authenticate usersin computer s
    13·1 answer
  • Click _______ to add a new column to a table.
    12·2 answers
  • Green field county stadium is planning to conduct a circket match between two teams A and B. A large crowd is expected in the st
    13·1 answer
  • 1. Problem solving is
    13·1 answer
  • If Asa changes the text to bold, he has changed the style. True False
    8·2 answers
  • In a non-formatted/standard template, if the number 25 is converted to text format, the
    14·1 answer
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    8·1 answer
  • Post as a reply your example of "data, which is processed into information" case - examples should not necessarily be related to
    13·1 answer
  • Which role involves designing and creating advertisements for marketing purposes?
    14·2 answers
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!