1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
3 years ago
8

Index addressing is for traversing arrays. True False

Computers and Technology
1 answer:
valina [46]3 years ago
8 0

Answer:

False.

Explanation:

Index addressing is not for only traversing the arrays but to also access the element,manipulate them.Though indexing is also used in traversing but it is not solely for that.Indexing in an array starts from 0 to size-1.

for example:-

We have an array a of size 10.So to access the element at position 6.We have to write.

a[5];

Manipulating it

a[5]=6;

You might be interested in
What is a massive, room-sized computer that process and store enormous amounts of bulk data and information?
kipiarov [429]

Answer:

Mainframe Computer

Explanation:

The Mainframe Computers are designed for bulk data processing with high speed and storing huge data that can't be performed by other regular PCs. They can run multiple instances of operating systems at the same time. They are used for application such as accounting, business transaction, information retrieval, airlines for the seat reservation and engineering computation.

7 0
2 years ago
Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp
laiz [17]

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


3 0
3 years ago
Read 2 more answers
Applying a bug fix:
viktelen [127]
Applying a bug fix: software update (patch)

Addressing a security flaw: software update (patch)

Improve ease of use: Software Update (new version)

Adding features: Software Update (new version)

This is what I believe the answer is! Hope this helped!
7 0
2 years ago
Read 2 more answers
Write a program to prompt the user to enter a fist name, last name, student ID and GPA. Create a dictionary called Student1 with
andrew-mc [135]

Answer:

Answered below

Explanation:

#Program is written in Python

first_name = input ("Enter first name: ")

last_name = input ("Enter last name:")

student_id = int(input("Enter your ID"))

gpa = float(input ("Enter your GPA: "))

student1 = {}

student1["first_name"] = first_name

student1["last_name"] = last_name

student1["student_id"] = student_id

student1["gpa"] = gpa

//Repeat same code for student2 and student3

class_list = {"student1": {"first_name":"joy","last_name":"Son","student_id":"1","gpa":"3.5"},

#Fill in for student 2 and 3}

#To remove GPA for all students

del class_list["student1"]["gpa"]

del class_list["student2"]["gpa"]

del class_list["student3"]["gpa"]

print(class_list)

4 0
3 years ago
A programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a s
Setler [38]

Answer:

Patent violation.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

In this scenario, a programmer hacks software code to understand how it works. Then she writes a program that replicates the implementation of a solution that has already been granted intellectual property protection.

Hence, this is an example of a patent violation because she was not given the permission or rights by the intellectual property owner to modify the software.

4 0
2 years ago
Other questions:
  • Design and implement a class Country that stores the name of the country, its population, its area, and the population density (
    6·1 answer
  • An information system is the entire set of __________, people, procedures, and networks that enable the use of information resou
    8·1 answer
  • In a spreadsheet, what is the rectangular space where a row meets a column?
    5·2 answers
  • This operator represents the logical AND.
    7·1 answer
  • True or false?
    13·1 answer
  • Technician A says that volatility describes how hard it is for gasoline to evaporate. Technician B says that Reid vapor pressure
    8·1 answer
  • What percentage of teens plays video games?<br><br> A.97%<br> B.100%<br> C.74%<br> D.50%
    12·2 answers
  • Cmo se puede añadir amigo ??'
    12·1 answer
  • What is a coaxial cable?
    5·1 answer
  • In this lab, you complete a prewritten Python program for a carpenter who creates personalized house signs. The program is suppo
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!