1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
3 years ago
15

Write a program to read in a two values row and col to initialize a 2D array using those values. Then create a function FindTran

spose to print both the original matrix and the transpose of the matrix.
Computers and Technology
1 answer:
anyanavicka [17]3 years ago
4 0

Answer:

The program to this question can be defined as follows:

Program:

#include <stdio.h> //defining header file

void FindTranspose(int r,int c,int ar[][c]);

int main() //defining main method

{

int r,c,i1,j1; //defining integer variable

printf("Enter row values: "); //message

scanf("%d",&r);//input row values

printf("Enter column values: "); //message  

scanf("%d",&c);//input column values

printf("input matrix number: "); //message

//defining loop to input value from user end

int ar[r][c]; //defining array

//input value in the loop

for(i1=0;i1<r;i1++)// row value

{

for(j1=0;j1<c;j1++)// column value

{

scanf("%d",&ar[i1][j1]); //input values

}

}

FindTranspose(r,c,ar); //calling function.

return 0;

}

//function FindTranspose to print original and transpose 2D array.

void FindTranspose(int r,int c,int ar[][c])

{

int i1,j1; //defining integer variable

printf("\nMatrix: \n"); //message

//print matrix

for(i1=0;i1<r;i1++)// row value

{

for(j1=0;j1<c;j1++)// column value

{

printf("%d ",ar[i1][j1]); // print value

}

printf("\n");

}

//print transpose matrix.

printf("\nTranspose of matrix\n"); //message

for(i1=0;i1<c;i1++)// column value

{

for(j1=0;j1<r;j1++)// row value

{

printf("%d ",ar[j1][i1]); //print value

}

printf("\n");

}

}

Output:

Enter row values: 2

Enter column values: 3

input matrix number: 1

2

43

5

6

7

Matrix:  

1 2 43  

5 6 7  

Transpose of matrix

1 5  

2 6  

43 7  

Explanation:

In the given code, the first header file is included, then declares a method, that is "FindTranspose". In this method, parameter two integer parameter and an array variable is passed.

  • Then the main method is declared, inside the main method, four integer variable "i1,j1,r,c, and ar" is declared, in which variable i1 and j1 used in loop and r,c is used to take input value of row and columns, and in the "ar" array we input value from the user, after input array element we call "FindTranspose" and pass a parameter, that is "ar,r, and c".
  • Inside the "FindTranspose" method, two integer variable "i1, and j1" is used in the loop, in the first loop it will print normal matrix, and in the second loop, it will print the inverse of this matrix.
You might be interested in
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
A crowd-funding open source business model, called _______, is where users offer money as a reward for new software or new featu
Lana71 [14]

Answer:

bounties        

Explanation:

The bounties are a free or open-source business model for the funding.It is is a payout or bonus which an offered by the community as a bonus or incentive or reward The bounties is offered when someone task to be done by not normally associated with the member or group.

In the software point of you, the bounties are defined as when the user gives a reward in the existing software when some new features are added into that software.  

5 0
3 years ago
A rectangular drawing object in which text or graphic images can be inserted and positioned anywhere on a page.
Julli [10]
Its b,because the sentence describes a text box so well,plus im in digital art
6 0
3 years ago
The computer mouse is used to
Alexandra [31]
Is there options to this question?
7 0
3 years ago
What is by far the most popular dns server software available?.
JulijaS [17]

Answer:

I use the server

8.8.8.8

and

8.8.4.4

Explanation:

6 0
3 years ago
Other questions:
  • Acrynom for wys or wyg
    10·1 answer
  • The index finger on your right hand types the _____.
    11·1 answer
  • In what year was google launched on the web?
    14·1 answer
  • In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as wel
    7·1 answer
  • Each device attached to your computer has a special program called a(n ________ that enables the device and operating system to
    13·1 answer
  • Describe the GRANT statement and explain how it relates to security. What types of privileges may be granted? How are they revok
    15·1 answer
  • Write a program that prompts the user to input the number of quarters, dimes, and nickels. The program then outputs the total va
    10·1 answer
  • What is one reason the number of DUIs has dropped?
    7·1 answer
  • How can the IOSP model help us to design an app that solves a problem?
    14·1 answer
  • WILL CHOOSE BRAINLIEST! in cells D6 through D8, enter formulas to calculate the values of the stocks. The formulas should multip
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!