1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
3 years ago
5

In C, developers may access arrays via bracketed syntax like Java or by using * dereferencing notation. The following assignment

statements use * notation. Provide the equivalent line of code using square bracket notation:
(a) (2 points) *racer = 22;
(b) (2 points) *(*(img) +1)) = 89;
(c) (2 points) *(*(img+15)+2)) = 64;
(d) (2 points) *(**(rgb_img+5)+1) = 320;
Computers and Technology
1 answer:
Vadim26 [7]3 years ago
6 0

Answer:

See explaination

Explanation:

Square bracket notation is useful when working with objects.

When working with bracket notation, make sure the property identifiers is a String. They can include any characters, including spaces. Variables may also be used as long as the variable resolves to a String.

Below is a representation of the bracket for the question;

a)

racer[0] = 22;

b)

img[1][0] = 89;

c)

img[15][2] = 64;

d)

rgb_img[5][0][1] = 320;

You might be interested in
Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
Virty [35]
Sjsjsjsjsjdhshshshshususs
7 0
2 years ago
Video Fundamentals
Tresset [83]

Answer:

1) a link, original, a pointer.

2) The media browser can help you by providing the very quick accessibility to all of your assets like iTunes songs, your movies in the movie folder, and this makes your file browsing experience simple while you edit the files.

You can leave the browser open as well as docked quite in the same manner as the other panel.

3) You need to display the Voice-over Record button. Now select your track in the timeline where you want to add the voice-over.

Now you need to go to the Timeline, and click on the Settings button, and finally select the Customize Audio Header.

Now you will see the Button Editor dialog box appearing, and now you need to drag and drop the microphone button to the required audio track, and finally, you need to click on OK.

4) While you are importing the audio or video to the Premiere Pro, it computes versions of such files, which it can readily use for quicker performance. And these are being termed as the Media cache files. And they are being saved in the Media cache files folder.

Explanation:

Please check the answer.

6 0
3 years ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
3 years ago
Is the movie IT really that scary ? Rate between 1-10, 10 being I had nightmares
mezya [45]
5 I don’t think it’s good. I thought it was boring.
4 0
3 years ago
What is an example of a situation in which you might use the append method? In what ways is the append method limited?
Oksanka [162]
If I had an array of the names of people who just walked in the door. I’d append the name of the person who came in next. To update the array.

The append method needs to be looped through to add multiple inputs
5 0
3 years ago
Other questions:
  • What two programming systems uses numbers and text?
    6·1 answer
  • Select the correct answer
    11·1 answer
  • Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending whe
    5·2 answers
  • A painting company has determined that for every 115 square feet or wall space, one gallon of paint and eight hours of labor wil
    11·1 answer
  • What do modern CPUs use to simulate the performance of multiple processors within one processor?
    9·2 answers
  • 75+ (43-54)<br> -12<br> 12<br> 41
    12·2 answers
  • Complete the sentence.
    8·1 answer
  • Describe the steps to change an existing macro in Microsoft office 2016
    6·1 answer
  • Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk
    8·1 answer
  • By default word documents include _______ margins on all sides of the document.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!