1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
3 years ago
11

Checkpoint 7.61 Write the prototype for a function named showSeatingChart that will accept the following two-dimensional array a

s an argument. const int ROWS = 20; const int COLS = 40; string seatingChart[ROWS][COLS]; Note: The two-dimensional array argument must be a const string array. You must include a second integer argument (scalar, not an array).
Computers and Technology
2 answers:
Kobotan [32]3 years ago
7 0

Answer:

void showSeatingChart(const string [][COLS], int);

Explanation:

void showSeatingChart(const string [][COLS], int);

The above function showSeatingChart() will display the 2D array of seating chart.

The return type of this function is void because it does not need to retun anything.

The parameter of the function is a 2D array which is seatingChart[ROWS][COLS].

The type of this 2D array is string that means it is a 2D array of string. It will contain string elements.

To declare a prototype of a function, there should be a semi-colon (;) at the end of declaration.

The definition of the function should be given outside main() function and declaration of the function should be above the main() function or at the beginning of the program with declaration of constant variables.

New2This2 years ago
0 0

void showSeatingChart(const string [][COLS], int);

You might be interested in
Conceptos importantes de red de computadoras
Bumek [7]

Answer:

-Consiste en conectar varias redes de computadoras basadas en diferentes protocolos -Requiere la definición de un protocolo de interconexión común sobre los protocolos locales. -El Protocolo de Internet (IP) desempeña este papel, definiendo direcciones únicas para una red y una máquina host.

3 0
3 years ago
Where could an identity theft access your personal information
Nikolay [14]
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
5 0
3 years ago
Read 2 more answers
Create a query that returns School Name, School Dean Last Name, School Dean First Name, Department Name, Department Chair Last N
Zepler [3.9K]

Answer:

SELECT  School_name,School Dean Last Name, School Dean First Name,Department Name, Department Chair Last Name, Department Chair First Name

FROM table_name

ORDER BY School Name,Department Name

8 0
3 years ago
Read 2 more answers
Which of the following<br> Services are<br> functions performed<br> by the general office?
GaryK [48]

Answer:

comment the choices please

6 0
2 years ago
Which of the following is not a primary environment in Autodesk Inventor? A. Parts B. Assemblies C. Animations D. Presentations
UNO [17]

I want to say it's C. Animations.

I hope this helps!

7 0
3 years ago
Other questions:
  • How many total channels are available in the United States for wireless LAN use in the unlicensed 2.4ghz ism band ?
    6·1 answer
  • How to burn mp3 on dvd
    13·2 answers
  • A growing number of large organizations have built internal Web sites that provide opportunities for online social networking am
    7·1 answer
  • Which principle of CSR requires that a business state facts fully and accurately?
    8·1 answer
  • The type of software used widely in businesses to complete specific tasks is _____. application software programming language sy
    15·2 answers
  • Which window allows you to view and change your computer's system information and settings?
    9·2 answers
  • Opportunities in nanotechnology apply broadly to many fields. Identify TWO areas of IT that may be impacted by its further devel
    6·1 answer
  • Help me find the difference between these logos
    10·2 answers
  • Calculate the total and average number from 1 to 100<br>​
    12·1 answer
  • What subnet mask can be used to segment the 172.16.0.0 network to allow for a minimum of 6 subnets while maximizing the number o
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!