1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
6

Given a String named word. Display the letters of the word, one letter per line.

Computers and Technology
1 answer:
nata0808 [166]3 years ago
4 0

Answer:

kk imo its jk ima programmer

You might be interested in
Can you answer this question?
patriot [66]

Answer:

To do this you'll need to use malloc to assign memory to the pointers used.  You'll also need to use free to unassign that memory at the end of the program using the free.  Both of these are in stdlib.h.

#include <stdlib.h>

#include <stdio.h>

#define SIZE_X 3

#define SIZE_Y 4

int main(void){

       int **matrix, i, j;

       // allocate the memory

       matrix = (int**)malloc(SIZE_X * sizeof(int*));

       for(i = 0; i < SIZE_X; i++){

               matrix[i] = (int *)malloc(SIZE_Y * sizeof(int));

       }

       // assign the values

       for(i = 0; i < SIZE_X; i++){

               for(j = 0; j < SIZE_Y; j++){

                       matrix[i][j] = SIZE_Y * i + j + 1;

               }

       }

       // print it out

       for(i = 0; i < SIZE_X; i++){

               for(j = 0; j < SIZE_X; j++){

                       printf("%d, %d:  %d\n", i, j, matrix[i][j]);

               }

       }

       // free the memory

       for(i = 0; i < SIZE_X; i++){

               free(matrix[i]);

       }

       free(matrix);

       return 0;

}

3 0
3 years ago
Which of the following can be used to replace internal network addresses with one or more different addresses so the traffic tha
love history [14]

Answer:

A Proxy Server

Explanation:

In data communication and computer networks, proxy servers are intermediaries or a gateway that sits between the user and the internet. The users are therefore separated from the web they browse. The proxy servers then provide filters and firewalls.

7 0
3 years ago
What are the uses of the tracrt and ping commands and what information is provided by each.
ikadub [295]

Answer:

The ping command is used to test the ability of a source computer to reach a specified destination computer. This command is used to verify if the sender computer can communicate with another computer or network device in the network.

The tracert command is used to show the details about the path sending a packet from the computer to whatever destination you specify.

6 0
3 years ago
Which is an example of a student practicing ethical behavior online??
professor190 [17]

Answer:

Zohar abides by his school’s Internet policy and does not visit questionable websites.

Explanation:

Only the first one is ethical behavior. The second choice is an example of plagiarism. The third & fourth choices could be examples of cyberbullying.  

4 0
3 years ago
Read 2 more answers
A survey of results on mobile phone datasets analysis
xxMikexx [17]
PErfect! 100% Absolutely beautiful. 
6 0
3 years ago
Other questions:
  • The merge process involves which two types of files?
    5·1 answer
  • Which steps would you take to determine how much an employee should be paid? Select all that apply.
    9·1 answer
  • The ____ contains all data definitions for a database, including table structures, security information, relationships between t
    11·1 answer
  • For questions 1 – 3, use the following partial class definitions:
    11·1 answer
  • Both k-means and k-medoids algorithms can perform effective clustering. (a)Explain the strength and weakness of k-means in compa
    5·1 answer
  • Types of relationships include aggregation, composition, link, generalization, and specialization 9. TRUE FALSE
    9·1 answer
  • )What item is at the front of the list after these statements are executed?
    8·1 answer
  • Bill, a manager at Publix has to make the weekly work schedule. He schedules each employee for either a day shift (8Am-5Pm), and
    5·1 answer
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
  • Operational level management can be supported by the systems except Select one: 01. Transaction Processing System 2. Manufacturi
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!