1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katyanochek1 [597]
2 years ago
15

To complete this quest, answer the following questions in the submission box below. Make x an array going from 0 to 100 by steps

of 2 units. (Array indexing) Make y an array going from 0 to 50 by steps of 1 unit. (Array indexing) Make z an array that is equal to [x1y1, x2y2, ..., xnyn]. (Arithmetic operations) Find the first 5 values of the z array. (Array indexing)
Computers and Technology
1 answer:
Law Incorporation [45]2 years ago
5 0

Answer:

C++.

Explanation:

#include <iostream.h>

void main(int argc,char* arg[])  {

   // Arrays

   int x[100];

   int y[50];

   int z[50];

////////////////////////////////////////////////////////////////////////////

   int count = 0;

   for (int i = 0; i < 100; i+=2) {

       z[count] = x[i] * y[count];

       count++;

   }

for (int i =0; i < 5; i++) {

   cout<<z[i]<<endl;

}

getche();

}

You might be interested in
What makes manually cleaning data challenging?
Alexxandr [17]

Manually cleaning data is done manually which makes it challenging. This make it prone to mistakes.

6 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Question 2Write a MIPS assembly implementation of the following C/C++ code. Assume small, unsigned integer arithmetic (no range
Licemer1 [7]

Answer:

Please kindly check explainations for the code.

Explanation:

lw $t1, Num1

lw $t2, Num2

lw $t3, Num3

blt $t1, $t2, if

beq $t1, $t2, elseif

else:

add $t0, $t3, 5

sw $t0, Result

endif:

#.....other statements after if-elseif-else

if:

sw $t1, Result

b endif

elseif:

ble $t2, $t3, if2

or $t0, $t1, $t3

sw $t0, Result

b endif

if2:

and $t0, $t2, $t3

sw $t0, Result

b endif

Go to attachment for the onscreen code.

4 0
3 years ago
Nothing bottomnothing
elena-s [515]

Answer:humans need energy to complete the regular body requirements to digest our food,to breathe,to move,to run,to travel and continue the metabolism of our regular life.

Explanation:energy is essential to life and all living thing organisms.

8 0
3 years ago
What makes jambinai so unique (it’s for band)
Rus_ich [418]

Answer:

Jambinai combines Korean folk music instruments and rock music instrumentation, which creates a different music style.

7 0
2 years ago
Other questions:
  • Write a program that asks the user to enter a number within the range of 1 through 10. Use a switch statement to display the Rom
    13·1 answer
  • 1. Do you consider Facebook, MySpace, and LinkedIn forms of disruptive or sustaining technology? Why?
    15·1 answer
  • Peter has recently bought a media player and a digital camera he wants to buy a memory card and then use devices which memory do
    11·2 answers
  • 1.) what is the minimum number of bits required to represent -3,997 using 2's complement form?
    6·1 answer
  • What kind of website uses keywords to locate content?
    15·1 answer
  • In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose
    12·1 answer
  • What do you call a collection of pre-programmed commands and functions used in programs?
    10·1 answer
  • Test unit 8 edhesive answers ​
    15·1 answer
  • Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential
    12·1 answer
  • Write a function solution that given an array a of n integers (between -100 and 100), returns the sign (-1,0,1) of product of al
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!