1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bumek [7]
3 years ago
13

Define a function UpdateTimeWindow() with parameters timeStart, timeEnd, and offsetAmount. Each parameter is of type int. The fu

nction adds offsetAmount to each of the first two parameters. Make the first two parameters pass by pointer. Sample output for the given program:

Computers and Technology
1 answer:
NARA [144]3 years ago
8 0

Answer:

Here is a UpdateTimeWindow() method with parameters timeStart, timeEnd, and offsetAmount

// the timeEnd and timeStart variables are passed by pointer

void UpdateTimeWindow(int* timeStart, int* timeEnd, int offsetAmount){

// this can also be written as  *timeStart = *timeStart + offsetAmount;

*timeStart += offsetAmount;  //adds value of offsetAmount to that of //timeStart

// this can also be written as  *timeEnd = *timeEnd + offsetAmount;

  *timeEnd += offsetAmount;  } //adds value of offsetAmount to that of //timeEnd

Explanation:

The function has three int parameters timeStart, timeEnd, and offsetAmount.

First two parameters timeStart and End are passed by pointer. You can see the asterisk sign with them. Then in the body of the function there are two statements *timeStart += offsetAmount; and *End+= offsetAmount; in these statements the offsetAmount is added to the each of the two parameters timeStart and timeEnd.

You might be interested in
What are the challenges of photographing at night? Why did the photographer “paint” the waterfall with the flashlight?
lianna [129]
Because he needed ligh
7 0
3 years ago
What is the purpose of the making of Nintendo Switch?
Elden [556K]

Answer:

To create a console that is suitable for children and families.

7 0
3 years ago
Read 2 more answers
How does the text recommend that a company operate if it wants to be successful in the information age?
Kryger [21]

Answer:

The answer is "Departmental interdependence".

Explanation:

In the given question some information is missing, that is an option, which can be described s follows:

A. Work independently across organizations.

B. Departmental interdependence.

C. As an individually small department or as a team.

D. Each organization functions as a separate business entity.

There are separate positions in each organization, but the departments can not actually interact with each other, in the hierarchical paradigm of interdependence and can not rely explicitly on each other, each division presents the same ultimate problem, and other choices were wrong, that is described as follows:

  • In option A, It is wrong because in the organization there are some protocol which will be followed by all.
  • Option C and Option D both are wrong because each organization's function is not separated by the business entity, and it is not small.
6 0
3 years ago
We have an internal webserver, used only for testing purposes, at IP address 5.6.7.8 on our internal corporate network. The pack
lukranit [14]

Answer:

Check the explanation

Explanation:

A packet filter firewall is used as a check point between internal corporate network to the outside internet. It blocks all the inbound traffic from the outside hosts trying to initiate a direct TCP connection to the internal corporate webserver. The network design with firewall is shown in the attached image below:

The figures in the attached image below shows an internal corporate network is protected with a packet filter firewall to minimize the inbound traffic from the external network or an internet. Therefore, the packet filter is used as a check point between the network.

The packet filter blocks all attempts by the outside hosts in order to initiate a direct TCP connection to the internal webserver of the internal corporate network.

Going by the second part of the attached image below can can therefore conclude that:

• Rule 1 specifies that, deny any packet with the destination address 5.6.7.8 if the STN flag of TCP header is set.

• Rule 2 specifies that, allow the inbound email traffic from the external source.

• Rule 3 specifies, allows the Outbound TCP traffic from the internal corporate network.

• Rule 4 specifies, allows outbound Email traffic from the internal corporate network to the external network.

• Rule 5 specifies, block any traffic from any source to the any destination.

3 0
3 years ago
What does the shell of an operating system do
Andre45 [30]

The OS shell allows access to the operating system services

8 0
2 years ago
Other questions:
  • When you use the bufferedreader class, you must import the ____ package into your program?
    14·1 answer
  • A variable must have its type declared but it is not required to be initialized prior to first use.
    12·1 answer
  • 1.Which type of camera tool pushes the picture back and makes it wider, exaggerating the distance between the background and for
    13·2 answers
  • What quantities are measured by the following sensors:
    9·1 answer
  • Which CSS attribute would change an element's font color to blue? font-color: blue; background: blue; color: blue; background-co
    10·2 answers
  • Why is it important to study in a quiet well lit area
    5·2 answers
  • Which function should be used to display a value based on a comparison ?
    6·1 answer
  • People who enjoy working with their hands might enjoy a career as a/an
    9·1 answer
  • What is wrong with question four? Find the error and then correct it
    11·1 answer
  • Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!