1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna11 [10]
4 years ago
7

•Write a program to display the duplicate values in an array.

Computers and Technology
1 answer:
Maksim231197 [3]4 years ago
6 0
I'm gonna help you out here by writing the jist of the loop that youll need because you may have to write this in c or java or python so all you need to do is create an array thats the same size as the array you want to duplicate and a for loop
int main ( ) {

int i,b [5],a [5] ={1,2,3,5,7};

for(i=0;i <5;i++)
{
b [i]=a [i];
}

return 0;
} //hope this helps :)
You might be interested in
The email program shipped with Microsoft office
denis23 [38]
That program is known as Outlook.  It ships with Microsoft Office and is an email program.
4 0
4 years ago
Which of the following documents specifies the uptime guarantee of a web server?A. Due processB. Due diligenceC. Scope of workD.
Harrizon [31]

Answer: D) Service Level Agreement.

Explanation: A service Level Agreement, also known by the acronym SLA, is a written agreement between a service provider and its customer in order to set the agreed level for the quality of such service. The SLA is a tool that helps both parties reach a consensus in terms of the level of service quality, in aspects such as response time, time availability, available documentation, personnel assigned to the service, among others.

6 0
3 years ago
Processor speeds are in bytes.<br><br> True<br> or<br> False
Aneli [31]

Answer:

true

Explanation:

Mainly true, but partly false. There are two bits in a computer that supply speed: The processor (measured in hertz eg. 2Ghz Processor) and RAM (bits and bytes eg 2GB of RAM). The processor is more to do with the speed programs run and load at, and RAM let's you use lots of memory intensive programs at the same time, although this also comes down to the processor and vice versa. Hope I helped :)

5 0
3 years ago
Read 2 more answers
Please write an Introduction on intrusion detection system and prevention system<br> PLEASE
77julia77 [94]

Answer:

An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.

6 0
2 years ago
Which of the following information would best be displayed throughout the use of a time line
timama [110]

D. a list of all your birthdays including the years...

3 0
3 years ago
Read 2 more answers
Other questions:
  • Build a state diagram for the “book” based upon the following information of the library.
    6·1 answer
  • Universal Containers has a requirement to integrate Salesforce with an external system to control record access. What option sho
    11·1 answer
  • In object-oriented programming, the object encapsulates both the data and the functions that operate on the data.
    10·1 answer
  • How do I select cells A3 through F3 in Excel 2013
    14·1 answer
  • How many feet are in 69 inches
    15·1 answer
  • Someone, please answer this.
    15·1 answer
  • How does having weak security on your browser represent the weakest link in a network
    8·1 answer
  • What is a presentation program? Name any<br> presentation programs.
    10·1 answer
  • How long does a seller have to ship an item on offerup
    14·1 answer
  • Tools such as microsoft's word, excel, and powerpoint are examples of ________ software. question content area bottom part 1 a.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!