1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
6

Write a program that reads in an array of type int . you may assume that there are fewer than 50 entries in the array. your prog

ram determines how many entries are used. the output is to be a two-column list. the first column is a list of the distinct array elements; the second column is the count of the number of occurrences of each element. the list should be sorted on entries in the first column, largest to smallest.
Computers and Technology
1 answer:
Alla [95]3 years ago
7 0
This may be a difficult thing to do so for anyone to ACTUALLY answer this you migghttt want to up the amount of points you get for answering maybe, 20-40 points.
You might be interested in
The ability for a protocol or program to determine that something went wrong is known as_________.
777dan777 [17]

Answer:

The correct answer to the following question will be Error-detection.

Explanation:

Error-detection: The detection of errors caused during the transmission from the transmitter to the receiver by damage and other noises, known as Error-detection. This error-detection has the ability to resolute if something went wrong and if any error occurs in the program.

There are mainly three types of error-detection, these types can be followed:

  • Automatic Repeat Request (ARQ)
  • Forward Error Correction
  • Hybrid Schemes

There are two methods for error-detection, such as:

  • Single parity check
  • Two-dimensional parity check

4 0
3 years ago
Which command displays the status of the ipsec installation?
Alexandra [31]
Character command shows the status.
8 0
3 years ago
A mobile device user has entered her user ID and password to access an online account. The user immediately receives a text mess
tensa zangetsu [6.8K]

Answer:

A. Multifactor authentication

Explanation:

Multifactor authentication is a security system process that requires a user to verify his or her identity by providing two categories of credentials.

A mobile device user has entered her user ID and password to access an online account, she immediately receives a text message with a unique PIN or One Time Password (OTP) that must be entered before she is granted access to the account. This is an example of a multifactor authentication security method.

8 0
3 years ago
Which of the following IS a positive effect<br> of the use of personal communication devices?
Goshia [24]

a) Personal communication devices are used in healthcare for sending e-mails or messages to healthcare members.

b) They use these devices for calculations.

c)They can access work related medical information by using mobiles.

2) Personal communication devices use at work has positive effect on their work including reducing stress, benefiting patients care improving coordination of patient care among the healthcare team or increases unit team work.

5 0
2 years ago
What evaluates variables that search engines use to determine where a URL appears on the list of search results?
RSB [31]

Answer:

The correct answer is "Search engine ranking".  

Explanation:

The search engine is also known as an Internet search engine that is developed for searching the website or the web. The search engine is a type of software system. When we search anything into the web there are so many website or related links are appeared the Search engine ranking means on searching on the top which is appeared or which appeared in bottom simply it gives the position of the searching web.

The main objective of the Search engine ranking to determine where a URL appears on the list on searching into the web.

6 0
3 years ago
Other questions:
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • Which of the following would be a tradeoff of a scientific advancement that enables us to catch fish from the ocean faster than
    5·1 answer
  • What is the energy conversion of solar water heaters?
    12·1 answer
  • Describe some ways that you personally use information technologies differently than you did just a few years ago
    11·1 answer
  • GAMER OYUNCU KOLTUĞU % YERLİ
    6·1 answer
  • Declare a variable temperature and initialize it to 98.6. Instructor Notes: Note that "initialize" means "declare and assign a v
    5·1 answer
  • What type of machine is a hand drill?<br><br> A. Simple machine <br> B. Compound machine
    8·2 answers
  • Given the arra
    15·1 answer
  • Which step in the software development life cycle analyzes the scope of work?
    6·1 answer
  • ____ is an example of a set of prewritten classes that allows you to access data stored in a database.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!