1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
10

Design pseudocode for a program that will permit a user to store exactly 50 numbers in an array. Create an array big enough to h

old the numbers and store each number in the array as it's entered. Be sure to PROMPT the user for each number before it's entered.
Computers and Technology
1 answer:
galben [10]3 years ago
6 0

Answer:

#include<stdio.h>

//declare a named constant

#define MAX 50

int main()

{

   //declare the array

   int a[MAX],i;

   //for loop to access the elements from user

   for(i=0;i<MAX;i++)

   {

      printf("\n Enter a number to a[%d]",i+1);

      scanf("%d",&a[i]);

  }

  //display the input elements

  printf("\n The array elements are :");

  for(i=0;i<=MAX;i++)

  printf(" %d ",a[i]);

}

Explanation:

PSEUDOCODE INPUTARRAY(A[MAX])

REPEAT FOR I EQUALS TO 1 TO MAX

PRINT “Enter a number to A[I]”

READ A[I]

[END OF LOOP]

REPEAT FOR I EQUALS TO 1 TO MAX

PRINT A[I]

[END OF LOOP]

RETURN

ALGORITHM

ALGORITHM PRINTARRAY(A[MAX])

REPEAT FOR I<=1 TO MAX

PRINT “Enter a number”

INPUT A[I]

[END OF LOOP]

REPEAT FOR I<=1 TO MAX

PRINT A[I]

[END OF LOOP]

You might be interested in
. How do you find and remove files whose names contain embedded spaces? What would the Linux command(s) be?
zloy xaker [14]

Answer:

The Linux command is <em>find</em><em>.</em>

Explanation:

The Linux command <em>find</em> suffices for finding and removing files whose names contain embedded spaces.

The command <em>find</em> supports <em>tests</em> of different kinds and predefined (and user-defined) <em>actions</em> in conjunction like that one looking for files with embedded spaces and then delete them.

We can achieve this using the following piece of code (as example):

<em>find . -regex '.* +.*' -delete</em>

The command <em>find</em> will look for files in the current working directory ( . ), execute the test <em>-regex</em>, to evaluate files in the <em>current directory</em> using the <em>case-sensitive regular expression test</em> (<em>regex</em>) (it could be also <em>-iregex</em>) that evaluates those files having names with <em>one or more</em> embedded spaces ( +)  between <em>zero or more</em> characters before (.*) and after (.*) of these embedded space(s) ( +).  

<em>Look carefully</em> that <em>one or more</em> embedded spaces is (are) represented in <em>regular expressions</em> using <em>a space </em>before the <em>metacharacter</em> (+),  and characters are represented using the metacharacter (.) before (*), that is, (.*)

In other words, the quantifier (+) represents <em>one or more</em> occurrences (or matches) and quantifier metacharacter (*) zero or more times cases for that evaluation.

So, after testing all files available in the current directory with -regex test, <em>find</em> will execute the action -delete for all files matching the result of such an evaluation (and finally obtaining what we are looking for).

The command <em>find</em> has several other tests (-name, -iname, -ctime, and many more) that can be used with logical operators (-and, -or, -not), some predefined actions like -delete (aforementioned), -ls (list), -print and -quit, and also offers possibilities for user-defined actions, as mentioned before.

8 0
3 years ago
To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
oksano4ka [1.4K]

Answer:

Deny

Explanation:

Under the New Technology System, the Deny permission is applied when the administrator wants to overrule the permission given to members of a group. The Allow and Deny options help in regulating access to the components of the system. Only authorized groups are granted access to the files.

Most times, the Deny permission is considered before the Allow permission. If the user is denied access to some files and granted access to some, the deny permission is most times considered first.

4 0
3 years ago
What does the following code print?
Gennadij [26K]

Answer:

a. 32

Explanation:

Form the above code

{ *yPtr +=3 ;

*zPtr,

c+=3;

func(c,bPTR,&c);

the a=*bPtr c

return value 32 after execution

8 0
3 years ago
Super Easy !!! Which of the following is one of the most primary maintenance steps for software?
charle [14.2K]

Answer:

keeping software programs up-to-date

Explanation:

4 0
4 years ago
Read 2 more answers
________ employs state-of-the-art computer software and hardware to help people work better together.
qaws [65]

Answer:not enough information

Explanation:

6 0
3 years ago
Other questions:
  • A company that manufactures machine parts order a new system that makes Products at ten times the speed of earlier machines. the
    13·2 answers
  • A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
    7·1 answer
  • Design and implement a java program (name it CheckPoint) that prompts the user to enter the x-coordinate and y-coordinate of a p
    6·1 answer
  • An ideal line length would include how many characters? A. 6570 B. 100 C. 100125 D. 4055
    8·1 answer
  • As discussed in the video, parallax measurements allow us to calculate distances to stars for which parallax is detectable. Supp
    14·1 answer
  • URGENT HELP PLEASE
    13·1 answer
  • To specify AutoCorrect rules and exceptions to the rules, click File to open the Backstage view, click ____ , and then click Pro
    6·1 answer
  • What is NOT a built-in function in python?<br> sqrt()<br> string()<br> fabs()<br> O print()
    12·2 answers
  • Alguien me podria ayudar a hacer este codigo porfavor? en php Desarrolle el código que solicite los datos (desde teclado) Nombre
    10·1 answer
  • Legends are titles given to three-axis X, Y, and Z-axis. True or false?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!