Answer:
Hi!
The correct answer is E.
Explanation:
void change(int ar[], int low, inthigh) {
int temp;
if(low< high) { <em>// here ask if the positions low and high of the array are the same.</em>
temp= ar[low]; <em>// first, saves the element on ar[low] in temp.</em>
ar[low]= ar[high]; <em>// second, the element on ar[high] in ar[low]. First switch.</em>
ar[high]= temp; <em>// third, saves the element on temp in ar[high]. Complete switch.</em>
change(ar,low + 1, high - 1); <em>// Recursive call, adding one position to low, and subtracting one position to high. </em><em>Important: </em><em>When low and high have the same value, the recursive call will finish.</em>
}
}
Result: Switch the lower half of elements in the array with the upper half.
Answer:
The resultants bits for two strings are 0111 1110
Explanation:
Given details:
two pair of strings are
10010100
11101010
comparing two pair of strings, then perform XOR operation
Rules to follow for XOR
If both the bits are same then resultant is zero 0 and if bits are different resultant is one
XOR operation:
10010100
11 1 01010
-------------
01111110
The resultants bits for two strings are 0111 1110
Pentium is just a brand of a CPU chips from Intel that is usually in your laptops or chromebooks. It's used for general purpose computing. Produced by Intel since 1993.
Answer:
Option D. Persuasive writing style
is correct answer.
Explanation:
- Alice should adopt the persuasive writing style as she wants to convince the people to adopt eco-friendly methods of living.
- When a person write persuasively, this means he/she will present justifications and reasons for that specific opinion he/she is trying to convince the audience.
- For the correctness of their opinion, different kinds of evidences are prepared so that the fact persuade the reader.
- Persuasive writing is used widely while writing academic papers, advertisements and argumentative essays as well.
<h2>
</h2><h2>
i hope it will help you!</h2>
Answer:
True
Explanation:
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key requirements includes certification and accreditation, which is a process that occurs after the system is documented, controls tested, and risk assessment completed. It is required before going live with a major system. Once a system is certified and accredited, responsibility shifts to the owner to operate the system is a true statement.