1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
8

Complete the below function which dynamically allocates space to a 3d array of doubles, initializes all values to 0, and returns

a pointer to the space.
1. double ***alloc3dArrayOfInts( int length, int width, int depth) {
2. double ***array3d = malloc(________ * sizeof(double **) );
3. for(int i=0; i< length ;i++) {
4. ________ = malloc(width * sizeof(double *) );
5. for(int j=0; j< ________;j++) {
6. __________ = malloc(depth * sizeof(double) );
7. }
8. }
9. return array3d;
10. }
Computers and Technology
1 answer:
MAVERICK [17]3 years ago
5 0

Answer:

Explanation:

1. double ***alloc3dArrayOfInts( int length, int width, int depth) {

2. double ***array3d = malloc(length * sizeof(double **) );

3. for(int i=0; i< length ;i++) {

4. array3d[i] = malloc(width * sizeof(double *) );

5. for(int j=0; j< width;j++) {

6. array3d[i][j] = malloc(depth * sizeof(double) );

7. }

8. }

9. return array3d;

10. }

You might be interested in
Consider the following static method, calculate.
vfiekz [6]

Answer:

return 8 * x

Explanation:

Given

The attached code segment

Required

Which single statement can replace the program body

From calculate(), we have:

x =  x + x;\\ x =  x + x;\\ x =  x + x;

The first line (x = x + x) implies that:

x=2x

So, on the next line; 2x will be substituted for x

i.e.

x = x + x becomes

x = 2x + 2x

x = 4x

So, on the third line; 4x will be substituted for x

i.e.

x = x + x becomes

x = 4x+ 4x

x = 8x

In programming: 8x = 8 * x:

This means that: return 8 * x can be used to replace the body

6 0
3 years ago
When correctly implemented, what is the only cryptosystem known to be unbreakable?
Leona [35]

When accurately executed, the only cryptosystem known to be unbreakable is called: "One-time Pad" (Option D)

<h3>What is a Crypto System?</h3>

The one-time pad is a cryptographic approach that cannot be broken but needs the usage of a single-use pre-shared key that is not less than the message being delivered. A plaintext is coupled with a unique secret key in this manner.

It should be emphasized that in cryptography, a cryptosystem is a collection of cryptographic algorithms that are required to perform a certain security function, such as confidentiality. A cryptosystem is often composed of three algorithms: one just for key generation, one for encrypting, and one for deciphering.

Learn more about Crypto System:
brainly.com/question/15084188
#SPJ1

Full Question:

When correctly implemented, what is the only cryptosystem known to be unbreakable?

A) Transposition cipher

B) Substitution cipher

C) Advanced Encryption Standard

D) One-time Pad

6 0
1 year ago
Of the following options, which is most helpful in developing the effective study habit of staying organized? Keep pens, pencils
Ray Of Light [21]

Answer:

d. Use a calendar to keep track of assignment due dates

Explanation:

other answers are incorect: just took the quiz, your answer is d.

5 0
3 years ago
Which menu selection under accessories will open a dos like window
Mekhanik [1.2K]
The answer is :Command prompt
6 0
3 years ago
The _________ in an internet are responsible for receiving and forwarding packets through the interconnected set of networks and
raketka [301]

Answer:

routers

Explanation:

<h2><em><u>Fill in the blanks</u></em></h2>

The<u> routers </u> in an internet are responsible for receiving and forwarding packets through the interconnected set of networks and making routing decisions based on knowledge of the topology and traffic/delay conditions of the internet.

3 0
3 years ago
Other questions:
  • What is the information age?
    12·1 answer
  • What is qwerty and why is it on the keyboard?
    15·2 answers
  • What are the four types of technical drawing?​
    9·1 answer
  • Obtaining the data of a video file from a flash drive is an example of a(n) _________ operation.
    6·1 answer
  • Which is a good way to improve your credit score
    5·1 answer
  • What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records
    8·1 answer
  • Can someone answer this for me will award brainliest lol
    11·2 answers
  • What will you see on the next line?
    11·1 answer
  • 8.5 Edhesive Code Practice
    14·1 answer
  • Given main(), complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!