Answer:
class Main {
public static void printPattern( int count, int... arr) {
for (int i : arr) {
for(int j=0; j<count; j++)
System.out.printf("%d ", i);
System.out.println();
}
System.out.println("------------------");
}
public static void main(String args[]) {
printPattern(4, 1,2,4);
printPattern(4, 2,3,4);
printPattern(5, 5,4,3);
}
}
Explanation:
Above is a compact implementation.
Technology can create or dimish occupations.
Technology can also make the job easier
Answer:
cyberspace
Explanation:
It is the notional environment in which communication over computer networks occurs.
Answer:
#include <iostream>
using namespace std;
void divide(int numerator, int denominator, int *quotient, int *remainder)
{
*quotient = (int)(numerator / denominator);
*remainder = numerator % denominator;
}
int main()
{
int num = 42, den = 5, quotient=0, remainder=0;
divide(num, den, "ient, &remainder);
return 0;
}
Explanation:
The exercise is for "Call by pointers". This technique is particularly useful when a variable needs to be changed by a function. In our case, the quotient and the remainder. The '&' is passing by address. Since the function is calling a pointer. We need to pass an address. This way, the function will alter the value at the address.
To sum up, in case we hadn't used pointers here, the quotient and remainder that we set to '0' would have remained zero because the function would've made copies of them, altered the copies and then DELETED the copies. When we pass by pointer, the computer goes inside the memory and changes it at the address. No new copies are made. And the value of the variable is updated.
Thanks! :)
Answer:
D. He should designate all the files in the shared folder as read-only.
Explanation:
The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.
In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.
By default, he is already the owner of the file, so option B is not the correct answer.
Also making the file executable give other users higher privilege, so option A is also not correct.