1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
4 years ago
10

You are given two int variables j and k, an int array zipcodeList that has been declared and initialized, an int variable nZips

that contains the number of elements in zipcodeList, and a bool variable duplicates. Write some code that assigns true to duplicates if any two elements in the array have the same value, and that assigns false to duplicates otherwise. Use only j, k, zipcodeList, nZips, and duplicates.
Computers and Technology
2 answers:
irina [24]4 years ago
5 0

Answer:

You cant use j =0… you have to use j = k+1, otherwise j =1 and k =1 will match up and be equal when really its comparing the exact same line to itself.

Explanation:

The solution will be as follows:

duplicates = false

for (k = 0; k < nZips; k++){

   for (j = k+ 1 ; j < nZips ; j++){

     if (zipcodeList [k] ==zipcodeList[j]){

          duplicates =true

           break;

              }

        }

}

dmitriy555 [2]4 years ago
3 0

Answer:

The c++ program for the scenario is given below.

#include <iostream>

using namespace std;

int main() {    

   int i,j, nZips, zipcodeList[nZips];

   bool duplicates;        

   cout<<"This program checks if duplicate values exist in the array." <<endl;    

   cout<<"Enter the number of integers to be inserted in the array."<<endl;

   cin>>nZips;    

   cout<<"Enter the integers to be inserted in the array."<<endl;    

   for(i=0; i<nZips; i++)

   {

       cin>>zipcodeList[i];

   }    

   for(i=0; i<nZips; i++)

   {

       for(j=0; j<nZips; j++)

       {

           if(i != j)

           {

               if(zipcodeList[i] == zipcodeList[j])

               {

                   duplicates = true;

                   cout<<"The value of duplicates variable is true meaning "<<duplicates<<endl;

                   break;

               }

               else

                   duplicates = false;

           }

       }

       

       if(duplicates == true)

               break;

}    

   if(duplicates == false)

       cout<<"The value of duplicates variable is false meaning "<<duplicates<<endl;    

   return 0;

}  

OUTPUT

This program checks if duplicate values exist in the array.

Enter the number of integers to be inserted in the array.

7

Enter the integers to be inserted in the array.

1234

2345

1234

5678

9087

6554

4560

3456

6789

The value of duplicates variable is true meaning 1  

Explanation:

The variables mentioned in the question are used as required. There is no logic applied to validate user input. It is assumed that user inputs only valid values.

This program is designed to check whether duplicate values are present in the array. The boolean variable duplicates is assigned value true or false depending on the presence of duplicate values.

The user is prompted the number of values to be put in the array along with those values.

Once the array is filled, the array is checked for identical values. If any identical value is present, the value of duplicates variable is assigned to true and the loop is discontinued.

If no identical values are present, the loop completes and duplicates variables is assigned the value of false.

In either case, the value of the duplicates variable is displayed.

You might be interested in
What is the name of the relationship between two ospf devices that are connected together and exchange link-state information?
Rudik [331]

Answer:

FULL neighbor state.

(FULL/DR or FULL/BDR)

Explanation:

The fact that the routers are neighbors is not enough to guarantee an exchange of link status updates; they must form adjacencies to exchange link status updates. Adjacency is the next step after the process of establishing neighbors. Adjacent routers are routers that go beyond a simple Greeting exchange and act in the database exchange process. To reduce the amount of information exchange in a given segment, OSPF selects a router as a designated router (DR) and a router as a designated backup router (BDR) in each multiple access segment. The BDR is chosen as the backup mechanism in case the DR fails. The idea behind this is that routers have a central point of contact for the exchange of information. In order to verify if two routers have established an adjacency, you can use the command: show ip ospf neighbor.

Here is an example:

R1#show ip ospf neighbor

 

Neighbor ID   Pri         State               Dead Time     Address      Interface

 

203.250.12.1    1     2WAY/DROTHER  0:00:37   203.250.14.3  Ethernet0

203.250.15.1    1     FULL/DR                0:00:36   203.250.14.2  Ethernet0

203.250.13.41  1     FULL/BDR              0:00:34   203.250.14.1  Ethernet0

5 0
3 years ago
What is phishing?
alexira [117]

Answer:

Phishing is the malicious act of keeping a false website or sending a false e-mail with the intent of masquerading as a trustworthy entity in order to acquire sensitive information such as usernames, passwords, and credit card details.

Therefore, the answer to the question is option C.

7 0
3 years ago
Select the correct answer.
Marina86 [1]
C: pie chart is the answer to it
4 0
3 years ago
Read 2 more answers
What is it called when a user makes a typing error when entering a url that takes him to an imposter website?
Shtirlitz [24]
It’s called a typo squatting
6 0
4 years ago
list the six external parts of a computer system, identify which is the output device and which is the input device?
Mariulka [41]
1.mouse input
2.keyboard input
3.monitor output
4.speakers output
5.printer output , and input if has scanner
5.microphone input
4 0
4 years ago
Read 2 more answers
Other questions:
  • Write a program LotheryPrinter that picks a combination in a lottery. In this lottery, players can choose 6 numbers ( possibly r
    9·1 answer
  • Write a program whose inputs are three integers, and whose output is the smallest of the three values.
    6·1 answer
  • In what year was the first mobile phone produced?
    15·1 answer
  • The _____ is the button that you push to take a photograph. i think its B Help PLZ
    5·1 answer
  • The type of human hair wig that is the most costly is:
    12·1 answer
  • Define the following concepts: computer network, network architecture, protocol, and multilayer protocol.
    11·1 answer
  • You need to provide connectivity between two buildings without running any cables. You decided to use two 802.11ac APs to provid
    14·1 answer
  • Addison, Inc. uses a perpetual inventory system. Below is information about one inventory item for the month of September. Use t
    15·1 answer
  • How will you ensure that all of the network's applications and tcp/ip services also support ipv6?
    10·1 answer
  • 9. True False
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!