1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
5

In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment

statements use * notation. Provide the equivalent line of code using square bracket notation:
(a) (2 points) *racer = 22;
(b) (2 points) *(*(img) +1)) = 89;
(c) (2 points) *(*(img+15)+2)) = 64;
(d) (2 points) *(**(rgb_img+5)+1) = 320;
Computers and Technology
1 answer:
Vadim26 [7]3 years ago
6 0

Answer:

See explaination

Explanation:

Square bracket notation is useful when working with objects.

When working with bracket notation, make sure the property identifiers is a String. They can include any characters, including spaces. Variables may also be used as long as the variable resolves to a String.

Below is a representation of the bracket for the question;

a)

racer[0] = 22;

b)

img[1][0] = 89;

c)

img[15][2] = 64;

d)

rgb_img[5][0][1] = 320;

You might be interested in
What is the full form of RPM in computer ​
alex41 [277]

Full from of RPM in computer is Revolutions Per Minute.

4 0
3 years ago
Read 2 more answers
Which type of hacker represents the highest risk to your computer?
Deffense [45]

Answer:

The hacker which represents the highest risk to my computer is the Script Kiddie.

Explanation:

A Script Kiddie cannot make their own programs.

They hack by using existing codes, scripts, web shells etc to access a work station, mutilate webpages etc.

The difference between a Hacker and a Script Kiddie is that a hacker does not need another person's code. They are skilled at writing their own codes which are can be very potent. This level of skill can be difficult to attain except for very bright minds.

The script kid needs very little knowledge of scripts and they are well on their way to causing damage.

Cheers!

4 0
3 years ago
Where are my files shortcut in documents folder.
faust18 [17]

Answer: Search File Explorer: Open File Explorer from the taskbar or right-click on the Start menu, and choose File Explorer, then select a location from the left pane to search or browse. For example, select This PC to look in all devices and drives on your computer, or select Documents to look only for files stored there.

Explanation: hope this helps :)

4 0
3 years ago
What are the three primary separation of concerns on the client-side of a dynamic web application? (Check all that apply)
nlexa [21]

Answer:

Behaviour

Style

Structure

Explanation:

Above are the three primary separation of concerns for a web application at client side.

Structure --> we can define the structure of the application at client side using HTML

style-->style is used to give some styling information like font,color,headings so on at client side .In general we use CSS to do this at client side

Behaviour--> it actually defines the functionality of the elements at client side like when we click button what it should do.We will use JavaScript to define the behaviours at client side

7 0
3 years ago
Mathematics and computer science share many concepts, such as recursion.
Virty [35]
The answer is B.

Read the answer I posted for your other question on the factorial of 7.
5 0
3 years ago
Other questions:
  • "Server Manager will allow you to manage all roles and features installed on any server, and view the status of all your servers
    7·1 answer
  • What do you call the number that is used as an index to pinpoint a specific element within an array?
    14·1 answer
  • A quick boot allows you to do what?
    7·2 answers
  • Instructions Write a program that asks the user for a number. If the number is between 1 and 255, the program outputs the corres
    15·1 answer
  • How to buy free big money computers that earn free money everydays?
    15·1 answer
  • What is the disadvantages of using proprietary software
    10·2 answers
  • What two pieces of information would you need in order to measure the masses of stars in an eclipsing binary system?
    9·1 answer
  • who will follow me on tiktok and like all my videos? if you do ill give branlist and give u a shoutout and you can enter my big
    15·1 answer
  • Can you give an example of mail merge (letter) pls​​
    6·1 answer
  • What does not stand for​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!