1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
7

(1 consider the following function definition: int func(int x, double y, char u, string name { //function body } which of the fo

llowing are correct function prototypes of the function func? explain why.
a. int func(x, y, u, name;
b. int func(int s, double k, char ch, string name;
c. int func(int, double, char, string;
d. func(int, double, char, string
Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
3 0
When prototyping an function also known as a function declaration at least in C++, we type out the function's return type, the name of the function and the parameters.

So, the answer would be B. int func(int s, double k, char ch, string name);
You might be interested in
Which statement describes the word "iterative"?
Umnica [9.8K]

guess you better read the directions and just read the book yourself and find the answer.

0 0
3 years ago
Read 2 more answers
Who needs to be involved when assembling business solutions that include hardware and software?
sveta [45]
Software engineer i would say
5 0
3 years ago
Read 2 more answers
What is virtual memory? What is the function of associative memory?
zheka24 [161]

Answer:

Virtual memory is a feature of an operating system that enables a computer to be able to compensate shortages of physical memory by transferring pages of data from random access memory to disk storage. ... This means that when RAM runs low, virtual memory can move data from it to a space called a paging file.

Associative memory is also known as content addressable memory (CAM) or associative storage or associative array. It is a special type of memory that is optimized for performing searches through data, as opposed to providing a simple direct access to the data based on the address.

3 0
3 years ago
ask user to input a string. (assume length of input string is 1) If the string is lower case, print its upper case If the string
Helga [31]

Answer:

import java.util.*;

import java.util.Scanner;

class Main

{

public static void main(String[] args) {

System.out.println("Enter String");

Scanner sc1=new Scanner(System.in);

String s1= sc1.nextLine();

boolean b= isNumerc(s1);

if (b== true)

{

    System.out.println("Its number: Sorry");

}

else

{

boolean a=isStringUpperCas(s1);

if(a == false)

{

    System.out.println(s1.toUpperCase());

}

else

{

    System.out.println(s1.toLowerCase());

}

}

}

private static boolean isStringUpperCas(String st1){

     

     

      char[] arr = st1.toCharArray();

     

      int k =0; boolean flag=true;

      while(k<arr.length)

      {

         

          if( Character.isUpperCase( arr[k] ))

          {

              flag=true;

              k++;

          }

          else

          {

              flag=false;

              k++;

          }

         

      }

      return flag;

}

             

  public static boolean isNumerc(final String st1) {

     

      if (st1 == null || st1.length() == 0) {

          return false;

      }

      for (char ch : st1.toCharArray()) {

          if (!Character.isDigit(ch)) {

              return false;

          }

      }

      return true;

  }

 

}

Explanation:

Please find the program above.

8 0
3 years ago
What are face shields intended to protect you from? (select best answer?
aivan3 [116]
Well it determends if there wearing them for sports or for fighting 
if it is for sports then they are protected from balls and such
if it is for fighting then they are protected from bullets arrows and anything else you could think of
they are used to shield your face
8 0
3 years ago
Read 2 more answers
Other questions:
  • Briefly discuss constraints
    13·1 answer
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • You have created a new DHCP scope with address range 192.168.1.1 to 192.168.1.254. You have five servers configured with static
    8·1 answer
  • Why is redundancy of data undersirable?
    7·2 answers
  • Pressing the Backspace key deletes the text to the of the insertion point. The left or the right?
    8·2 answers
  • Chief technology officers can influence a company's current and future ____.
    9·1 answer
  • Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
    7·1 answer
  • What does a GPA show
    14·2 answers
  • A column does not consist of
    10·1 answer
  • Vẽ sơ đồ lắp đặt gồm 2 cầu chì, 1 ổ điện, 2 cực điều khiển 2 đèn mắc song song
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!