1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katyanochek1 [597]
3 years ago
15

To complete this quest, answer the following questions in the submission box below. Make x an array going from 0 to 100 by steps

of 2 units. (Array indexing) Make y an array going from 0 to 50 by steps of 1 unit. (Array indexing) Make z an array that is equal to [x1y1, x2y2, ..., xnyn]. (Arithmetic operations) Find the first 5 values of the z array. (Array indexing)
Computers and Technology
1 answer:
Law Incorporation [45]3 years ago
5 0

Answer:

C++.

Explanation:

#include <iostream.h>

void main(int argc,char* arg[])  {

   // Arrays

   int x[100];

   int y[50];

   int z[50];

////////////////////////////////////////////////////////////////////////////

   int count = 0;

   for (int i = 0; i < 100; i+=2) {

       z[count] = x[i] * y[count];

       count++;

   }

for (int i =0; i < 5; i++) {

   cout<<z[i]<<endl;

}

getche();

}

You might be interested in
A(n) ____ is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offens
serious [3.7K]

Answer: <em>Internet filter</em>

Explanation:

Internet filters are referred to as software which prevents individuals from accessing certain kind of websites. These filters are predominantly used in order to block content that might be considered inappropriate for some users. These filters are widely used in public library and computers used by schools and colleges.

4 0
3 years ago
What is data mining ​
Vesna [10]

Answer:

Data mining is a process of extracting and discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

5 0
3 years ago
Read 2 more answers
A customer has several small branches and wants to deploy a Wi-Fi solution with local management using CAPWAP. Which deployment
mash [69]

Answer:

Mobility express

Explanation:

Mobility express is defined as the ability to use the access point or the AP as a controller. It related to the lightweight network which is without a controller box. The access point of the mobility express uses CAPWAP images.

The CAPWAP stands for Control And Provisioning of Wireless Access Points. It is standard protocol which allows a central wireless of LAN access controller to use and manage the wireless access points.

Thus a customer who has various small branches and wishes to deploy a Wi-fi solution with the local management using CAPWAP should use the Mobility express as the deployment model.

6 0
3 years ago
Which of the following IS a positive effect<br> of the use of personal communication devices?
Goshia [24]

a) Personal communication devices are used in healthcare for sending e-mails or messages to healthcare members.

b) They use these devices for calculations.

c)They can access work related medical information by using mobiles.

2) Personal communication devices use at work has positive effect on their work including reducing stress, benefiting patients care improving coordination of patient care among the healthcare team or increases unit team work.

5 0
2 years ago
Discuss all the features on 1-5th generation of computer​
stira [4]

Answer:

What is the features of fifth generation computer?

Fifth Generation Computers

In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components. This generation is based on parallel processing hardware and AI (Artificial Intelligence) software.

5 0
3 years ago
Other questions:
  • suppose you need to verify how to correctly use commas. you pen your English textbook and scan the chapter titles in which one w
    15·1 answer
  • Many who enter the field of information security are technical professionals such as __________ who find themselves working on i
    13·1 answer
  • How can I sent a message?
    13·1 answer
  • What is the subnet mask ?
    9·2 answers
  • What is the main feature of chat rooms?
    9·2 answers
  • What is the age group for the silent genration
    10·1 answer
  • Is a biometric system an input, output, storage or soft device?​
    6·1 answer
  • Flodding on rivers is caused by human activity rather than natural events true or false
    8·1 answer
  • Hi I got a new phone and my photos are taking so long to download, on Friday it was at 13000 what do I do it’s taking so long
    14·1 answer
  • a. Describe how the student can use the jar of rice to model particle motion of a substance in each state of matter: solid, liqu
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!