1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dybincka [34]
3 years ago
14

I have a real struggle when it comes to working with strings, whether they're arrays or pointers to strings, and I'm lost cause

when I read or watch tutos I understand them, but then I'm like a novice when I need to write actual code, what should I do?
PS: I'm using C language.
Computers and Technology
1 answer:
neonofarm [45]3 years ago
6 0
In C, you deal with a string always via a pointer. The pointer by itself will not allocate memory for you, so you'll have to take care of that.

When you write char* s = "Hello world"; s will point to a "Hello world" buffer compiled into your code, called a string literal.

If you want to make a copy of that string, you'll have to provide a buffer, either through a char array or a malloc'ed bit of memory:

char myCopy[100];
strcpy(myCopy, s);

or 

char *myCopy;
myCopy = (char*)malloc( strlen(s) + 1 );
strcpy(myCopy, s);

The malloc'ed memory will have to be returned to the runtime at some point, otherwise you have a memory leak. The char array will live on the stack, and will be automatically discarded.

Not sure what else to write here to help you...
You might be interested in
What should you do when you encounter an active directory domain controller for the domain could not be contacted?
Nostrana [21]

Answer:

Issue the Dcdiag on all domain controller servers.

Explanation:

Active directory is a database that holds information of client's authentication for service access in a server. Domain controllers in servers holds these active directories, to replicate client's credentials for quick response to access to the server.

When a server domain can not contact the active directory domain controller, the Dcdiag command is issued on the server to check for connectivity issue to the DNS, AD replication, SYSVOL replication etc.

8 0
4 years ago
Vivian wants to increase the storage capacity of her computer. Which components should she upgrade?
Nikitich [7]

Answer:

Hard drive

Explanation:

The hard drive is where the operating system, programs and data reside on (unless the data is saved and backed up elsewhere). An older hard drive that uses platters for reading and writing data to it will be slower than a later model solid state device. Newer hard drives have very fast access speeds compared to older units.

4 0
4 years ago
Convert to binary 140
Ber [7]

00110001 00110100 00110000

5 0
4 years ago
In 4-bit two's complement representation, what is the binary encoding of the number -5?
Katena32 [7]

Answer:

a) 1011

Explanation:

In 4 bit two's complement representation, the first bit is the sign bit.

If the sign bit is 1, the number is negative.

If the sign bit is 0, the number is positive.

What is the magnitude of the sign bit?

In n-bit two's complement representation, the magnitude of the sign bit is:

2^{n-1}-1

So, in 4-bit two's complement representation, the magnitude of the sign bit is:

2^{4-1}-1 = 8

Since the number is negative, the value of this bit is -8.

The other bits are magnitude bits, positive.

We have that the sum of these bits must be -5, and we already have -8. So what should be the value of these last 3 bits?

First, i am going to solve this equation to find the decimal value of the last three bits.

-5 = -8 + x

x = 3

So, the last three bits are:

3_{10} = (011)_{2}

The binary encoding of the number -5 is:

a) 1011

5 0
3 years ago
Use the drop down menus to describe how adman can add shapes to his presentation
alina1380 [7]

Answer:

✔ Illustrations

✔ a crosshair

✔ left-click and drag

Explanation:

6 0
3 years ago
Other questions:
  • Explain how buyers and sellers factor into setting the stock price for a company’s shares.
    13·1 answer
  • A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a _____.
    7·2 answers
  • I need someone to transfer this into a database in excel Please help :D 7 pts
    15·1 answer
  • Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent singl
    12·1 answer
  • In the code snippet below, pick which instructions will have pipeline bubbles between them due to hazards.
    12·1 answer
  • Visual media that gives the appearance of a movement can be a collection of graphics<br>​
    10·2 answers
  • Which of the following is equivalent to (p&gt;=q)? <br> i) P q iv) !p Where are genius people?:)
    6·1 answer
  • Java can be procedural or object-oriented when it comes to programming. What is the difference between procedural and OOP?​
    13·1 answer
  • Does any of yall play rob lox?
    5·2 answers
  • Which of the following best explains how algorithms that run on a computer can be used to solve problems?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!