1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artemon [7]
3 years ago
10

Consider the following C code fragment:

Computers and Technology
1 answer:
wlad13 [49]3 years ago
8 0

Answer:

10

Explanation:

Pointer arithmetic is tricky. The address is incremented by the sizeof the pointed element. A short is 2 bytes.

So adding 10 adds 20 bytes to the starting address of arr[].

In the expression, you're adding 10-6 = 4 to the start of the array, so you're pointing at the fifth element, arr[4] which is 10.

You might be interested in
"What technology will examine the current state of a network device before allowing it can to connect to the network and force a
EleoNora [17]

Answer: A. Network Access Control (NAC)

Explanation:

The CORRECT answer is (A.) <em>Network Access Control (NAC)</em>. NAC refers to an method used in computer protection in which aspects such as antivirus, or host intrusion prevention among others are somehow consolidated in order to unify endpoint security. Such an approach allows the system authentication to enforce network security.

7 0
3 years ago
A ……………………………is used to verify the identity of a website and is issued to the owner of the website by an independent and recogni
dimaraw [331]
I believe the answer is a digital certificate
7 0
3 years ago
Read 2 more answers
Which type of system would be more reliable for keeping a plane traveling at constant speed – an automatically controlled feedba
Anastasy [175]

In order to keep the plane travelling at a constant speed, an automatically controlled feedback loop is more reliable.

<u>Explanation:</u>

The main reason behind this is that the plane needs to travel at a constant speed and that would only be maintained by setting constant feedback for the loop.

The feedback being constant will correspond to constant input which will, in turn, correspond to a constant output and hence constant speed.

In the case of using a manually controlled feedback loop, feedback will have to be provided manually at each iteration which is not practically viable as there is a scope for errors.

6 0
3 years ago
1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch
Sav [38]

Answer:

The switch sends broadcast traffic to all ports like a hub to get the number of ports used and build its MAC address table.

Explanation:

A network switch is a device used in a LAN to connect all available workstations. Unlike a network hub, it is able to send frames from a host or workstation to another using its MAC address table.

An example of a switch is the Cisco 2950 switch. When it is first turned on, it acts as a hub, broadcasting traffic to all its ports. This process is used to create a MAC address table to get the IP address of workstations and the ports they relate to, enabling it to send unicast traffic to a specific port.

7 0
3 years ago
Who where the romanovs? What happened to them ?
Vikentia [17]
They where high ranking aristocrats in Russia during the 16th century. They where all executed.
5 0
3 years ago
Other questions:
  • _ includes websites that encourage interaction and connection among people, businesses, and organizations.
    5·1 answer
  • The Sumif formula will add numbers together from a range of numbers ONLY IF they contain the criteria. True or false
    8·1 answer
  • How does LinkedIn differ from other popular social media platforms? What are the similarities?
    6·1 answer
  • When using Regedit to browse through the registry, the key that is highlighted is the ________, and its value entries are visibl
    5·1 answer
  • Enter the answer.
    11·2 answers
  • What are registers in ICT used for?
    5·1 answer
  • 2) A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long
    7·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
  • The first person to say something in here will get brainliested.
    7·2 answers
  • How does the issue of cybersecurity relate to the internet of things?.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!