1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnom [1K]
4 years ago
8

Index addressing is for traversing arrays. True False

Computers and Technology
1 answer:
valina [46]4 years ago
8 0

Answer:

False.

Explanation:

Index addressing is not for only traversing the arrays but to also access the element,manipulate them.Though indexing is also used in traversing but it is not solely for that.Indexing in an array starts from 0 to size-1.

for example:-

We have an array a of size 10.So to access the element at position 6.We have to write.

a[5];

Manipulating it

a[5]=6;

You might be interested in
Which statement is true of Web-based electronic data interchange (Open EDI)? a. It consists of international agreements on priva
ale4655 [162]

Answer: (B) It reduces the cost of transmitting documents

Explanation:

 The web based EDI (Electronic data interchange) is one of the simplest technique for transmitting the various types of documents by using the EDI system.

In the web based electronic data exchange, we exchange the file or document by using the web forms in the internet browser.

The main advantage of the web based EDI system is that it reduces the overall cost during the transmission of documents. The EDI system is basically bases on the SAAS (Software as a service) principle and it is widely used in the business.

Therefore, Option (B) is correct.

6 0
3 years ago
Integrity constraints are enforced by Group of answer choices A. The operating system B. The end user C. The database designer D
slega [8]

Integrity constraints are enforced by The database designer.

<h3>What are Integrity constraints?</h3>

An  Integrity Constraints is known to be the protocols that a table's data columns is mandated to follow.

Note that they are used to hinder the types of information that can be put into a table and as such, Integrity constraints are enforced by The database designer.

Learn more about Integrity constraints from

brainly.com/question/28026113

#SPJ1

4 0
2 years ago
What is best defined as a phishing email that is targeted directly at you?.
Inga [223]

Answer:

spear phishing hope its right

6 0
3 years ago
Your company has a team of remote workers that need to use Windows-based software to develop company applications, but your team
timofeeve [1]

Operating systems are the software that supports the basic functioning of the computer. Windows Virtual Desktop is an Azure compute service that will help solve the problem.

<h3>What is Windows Virtual Desktop?</h3>

Windows Virtual Desktop is an app virtualization service of Azure that operates on the cloud platform. It includes standard operating procedures that can be used by users with multiple OS.

Azure's Virtual Desktop supports different versions of window OS. This type of system is majorly used in remote work demands and specialized workloads.

Therefore, Windows Virtual Desktop is an Azure compute service.

Learn more about Azures service here:

brainly.com/question/13144160

#SPJ1

5 0
2 years ago
14. The Internet may best be compared to a/an
finlep [7]
From that particular list, the item that best compares to the internet
is B. a large network of roads.
7 0
3 years ago
Read 2 more answers
Other questions:
  • When purchasing a(n) ________ computer, having cellular as well as wifi can be important?
    9·1 answer
  • Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins with a
    13·1 answer
  • How can i add card reader to pc answers?
    9·1 answer
  • Nadia would like to find text in her current document that differentiates CompanyABC from companyabc. Which option should she us
    8·2 answers
  • Name at least two types of career options that are available for someone with strong typing skills?
    10·2 answers
  • (a) Convert to hexadecimal: 1457.1110. Round to two digits past the hexadecimal point.
    8·1 answer
  • A or an is a simple chip with two or more processor core
    5·1 answer
  • Which of the following is NOT an example of soft skill?
    8·1 answer
  • What do u mean by generation of computer
    10·1 answer
  • A slide titled Alexander Graham Bell. There are 6 bulleted entries on the slide, and there is a lot of text on the slide. There
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!