1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
10

Consider the following C code fragment:

Computers and Technology
1 answer:
wlad13 [49]3 years ago
8 0

Answer:

10

Explanation:

Pointer arithmetic is tricky. The address is incremented by the sizeof the pointed element. A short is 2 bytes.

So adding 10 adds 20 bytes to the starting address of arr[].

In the expression, you're adding 10-6 = 4 to the start of the array, so you're pointing at the fifth element, arr[4] which is 10.

You might be interested in
The security administrator for Corp wants to provide wireless access for employees as well as guests. Multiple wireless access p
Artemon [7]
It’s B I took the test
7 0
4 years ago
Why do computers need system software?
Marina86 [1]
<span>Computers don't need system software. System software is used to automate many tasks so the user can achieve more. Actually, one of the ideas of computer programming is to avoid needless repetition. The system software will prepare the computer for the user.</span>
5 0
3 years ago
Lesson 9 looping and random numbers
Pavlova-9 [17]

Answer:

??????????????????????????????????????????////

Explanation:

8 0
3 years ago
What are the benefits of using disk cleanup as part of regular maintenance on a computer​
Morgarella [4.7K]

Your computer will absolutely benefit. Disk Cleanup is a Windows tool that lets you clean junk files and temporary files that are no longer needed, thus increasing space and performance.

4 0
3 years ago
1. Go to a popular online electronic commerce site like Amazon. Place several items in your shopping cart, and then go to check
MakcuM [25]
On Amazon.com, I found that there are a few cryptosystems and protocols in place. The most interesting thing I found was that there were 12,292 blank lines of code before anything was actually written. Amazon ensures a secure transaction by encrypting the users information on the users end, and then decrypts their information on their end.
7 0
2 years ago
Other questions:
  • What computer system was the first to run the unix operating system?
    11·1 answer
  • What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
    13·1 answer
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • Senior executives at a global manufacturing company are determining the key performance indicators they'll use to judge how effe
    15·1 answer
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • A switch that is configured to use the Spanning Tree Protocol will place a port in ____________ mode if sending traffic to it ma
    11·1 answer
  • Union Carbide accident safety policies and procedures were not followed was due to
    14·1 answer
  • You can use a minus sign to make a negative numberlike -2. What happens to each of the following 2++2
    8·1 answer
  • 4.11 lesson practice quizz need help on 2 and 3
    5·1 answer
  • Practising some questions for board exams for class 12 python,pls help with detailed answer
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!