1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
4 years ago
14

The _________ indicates the number of elements, or values, an array can hold

Computers and Technology
1 answer:
Stolb23 [73]4 years ago
8 0
The size declarator indicates the number of elements, or values, an array can hold.It is used in a definition of an array.<span>The size declarator must be a constant integer expression with a value greater than zero. </span>A subscript is used to access a specific element in an array. 
You might be interested in
5. What are some situations where you might find it useful to use the “!” symbol in a program?
svlad2 [7]

Answer:

The most common use of symbols by programmers is for performing language reflection (particularly for callbacks), and most common indirectly is their use to create object linkages. In the most trivial implementation, they have essentially named integers (e.g. the enumerated type in C).
<u>Help Me By Marking Me as Brainlist ...</u>

5 0
2 years ago
Read 2 more answers
Who is the father of computer​
Otrada [13]

Answer:

Charles Babbage is the father of computer.

hope this helps.

8 0
3 years ago
Convert the Binary Number to a Decimal Number 101
julsineya [31]
5
Reading for right to left (backward to normal) 
The first 1 is one in base 10 (decimal). 
The Zero is null (as in none)
The last (or first reading from left to right) means 4.
4+0+1 = 5
1+0+1 = 5

5 0
3 years ago
Sort short_names in reverse alphabetic order.
tangare [24]

lst = short_names.split()

print(sorted(lst,reverse = True))

6 0
3 years ago
Which of these is true of blackhat and whitehat hackers?
earnstyle [38]

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

5 0
3 years ago
Read 2 more answers
Other questions:
  • For microsoft word tabs are very useful when you want to
    13·1 answer
  • What's does the Mutual Reward Theory state?
    10·1 answer
  • If a person was on board a hypersonic airplane what do you think they would be able to see as they look out a window looking in
    13·2 answers
  • What is the name of the symbol that is used to classify and categorize information?​
    10·2 answers
  • To display a pop-up form for a control, such as account number in a datasheet create a user interface (UI) macro that is associa
    12·1 answer
  • Would 2 bits be enough to create a special code for each english vowel
    12·1 answer
  • In your opinion., which Zelda character is the hottest? Be honest.
    7·1 answer
  • Please answer questions in complete sentences!
    14·1 answer
  • When you _______ the top row or the left column, you can keep column headings and row labels visible as you scroll through your
    8·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!