1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
14

I have a real struggle when it comes to working with strings, whether they're arrays or pointers to strings, and I'm lost cause

when I read or watch tutos I understand them, but then I'm like a novice when I need to write actual code, what should I do?
PS: I'm using C language.
Computers and Technology
1 answer:
neonofarm [45]3 years ago
6 0
In C, you deal with a string always via a pointer. The pointer by itself will not allocate memory for you, so you'll have to take care of that.

When you write char* s = "Hello world"; s will point to a "Hello world" buffer compiled into your code, called a string literal.

If you want to make a copy of that string, you'll have to provide a buffer, either through a char array or a malloc'ed bit of memory:

char myCopy[100];
strcpy(myCopy, s);

or 

char *myCopy;
myCopy = (char*)malloc( strlen(s) + 1 );
strcpy(myCopy, s);

The malloc'ed memory will have to be returned to the runtime at some point, otherwise you have a memory leak. The char array will live on the stack, and will be automatically discarded.

Not sure what else to write here to help you...
You might be interested in
(True or False) The speed at which data travels on a bus is referred to as the word size.
geniusboy [140]

Answer:

True

Explanation:

4 0
2 years ago
Read 2 more answers
Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
Karo-lina-s [1.5K]

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

<h3>Artificial intelligence, machine learning, and malware</h3>

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

brainly.com/question/399317

4 0
2 years ago
There's an App for That!
AleksandrR [38]

Answer:

Im confused man

Explanation:

6 0
3 years ago
I am having trouble figuring out if this is correct. Can someone please help me ASAP?
CaHeK987 [17]

Explanation:

The X's have been correctly placed in the chart

A surge suppressor, which is also commonly known as a surge protector, is an important equipment that helps prevent damage to electric components from an unexpected increase of voltage. Let’s assume that you are living in a county where the effective utility voltage is between 110 to 120 volts. Assume that the accepted peak voltage should not be anything higher than 170 volts. If there is a surge and this surge reaches peak levels of 170 volts and higher, surge suppressors should jump in and prevent the peak AC voltage from going above the threshold.

People tend to confuse line conditioners and surge suppressors. While surge suppressors protect components from surges, line conditioners are built to make up for the loss of voltage from the lines. It does so by storing some power energy. This stored energy can later be modified and used when the volts drops to the desired 110 volts.

A UPS has DC battery power that provides battery backup power when the electricity goes off or when the levels of voltage drop significantly. When the electricity goes off means that the voltage is at 0 volts and it is the work of the UPS to kick its backup power in.

6 0
3 years ago
When would it be necessary to shoot in 4K according to the presentation?
Nataly_w [17]

Answer:

because it provides you a lot of storage and the post production equipment to handle it and it is used to do big projects

Explanation:

so l know this much it is correct please mark me brainllest

6 0
2 years ago
Other questions:
  • Hybrid processors that can process 32 bits or 64 bits are known by what term?
    8·1 answer
  • The component in a disk brake unit acts as a return spring and allows the pad to move a ay from the rotor is the
    6·1 answer
  • Discuss anomaly detection.
    5·1 answer
  • Different video files and ______ can cause compatibility issues to arise between computer systems.
    8·1 answer
  • Semantic search engines use NLP, contextual cues, synonyms, word variations, concept matching, specialized queries, and other st
    6·1 answer
  • Sharon must give an informative presentation to a group of teenagers about cultivating earthworms for use in home gardening. Whi
    11·2 answers
  • if a second system failure occurs while the first recovery is in progress, what needs tobe done after the system recovers for th
    11·1 answer
  • Which avenue may utilize video streaming, audio narration, print designs and animation?
    7·1 answer
  • Who Has any idea How to code?
    7·2 answers
  • Which types of file formats are the best choice for files that may need to be edited later?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!