1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ICE Princess25 [194]
3 years ago
10

Write a statement that declares a prototype for a function printArray, which has two parameters. The first parameter is an array

of element type int and the second is an int, the number of elements in the array. The function does not return a value
Computers and Technology
1 answer:
Savatey [412]3 years ago
4 0

Answer:

void printArray(int [],int);

Hope this helps!

You might be interested in
>What is the output of the following code:
ozzi

Answer:

Given code output is "786".

Explanation:

Code:

list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter

print (list1[1] )#use a print method that prints list index value

In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.

5 0
2 years ago
Jonathan created a presentation for his workplace. He now wants to embed an audio file in the presentation. Which file format sh
viva [34]

Answer:

He can use any of the audio formats like MP3 and M4A.

Explanation:

6 0
3 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
What I'd the keyboard shortcut for applying bold font to a text selection ​
garik1379 [7]

It is the second option

3 0
3 years ago
Which of the following is an example of new and emerging classes of sofware
malfutka [58]
We need to know what was listed :)!
3 0
2 years ago
Other questions:
  • Which tasks can a user accomplish by using the Find and Replace feature of Word? Check all that apply.
    11·1 answer
  • What can search the Internet and select elements based on important words?
    6·2 answers
  • Heather has segmented all of the individuals in her database into four categories according to how many game tickets they purcha
    12·2 answers
  • Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three t
    10·2 answers
  • Image-editing software is used to _____.
    15·2 answers
  • Using complete sentences post a detailed response to the following.
    5·2 answers
  • hich type of denial of service (DoS) attack occurs when a name server receives malicious or misleading data that incorrectly map
    6·1 answer
  • What key value does Accenture’s myConcerto bring to clients looking for automated solutions?
    6·1 answer
  • Micheal is the project manager in a company. He wants his organization to use technology for higher revenue and productivity. Wh
    13·1 answer
  • What is the relationship between agile teams and project requirements
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!