1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stich3 [128]
3 years ago
6

Write the definition of a function named swapints that is passed two int reference parameters. The function returns nothing but

exchanges the values of the two variables. So, if j and k have (respectively) the values 15 and 23, and the invocation swapints(j,k) is made, then upon return, the values of j and k will be 23 and 15 respectively.
Computers and Technology
1 answer:
Alja [10]3 years ago
3 0

Answer:

void swapints(int *j,int *k)//Function definition.

{

   *j=*j+*k-(*k=*j); //value swapping.

}

swapints(&j,&k);//call the function.

Explanation:

  • The above function definition takes the address of j and k variables which is stored on the pointer variable j and k.
  • Then the pointer variable uses the j and k value for the above expression, and the user does not need to return the value of j and k.
  • But when the user prints the value of the j and k variable, then he gets the swapping value of the j and k variable.
  • The user needs to know that the "int j" is a normal variable, but "int *j" is a pointer variable that is used to take the address of j variable.
You might be interested in
Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
son4ous [18]

Answer:

The answer is "Option d"

Explanation:

Description to this query can be defined as follows:

  • All of the three (User location, Location modifier, and viewport) are used to identify range demotions.
  • The Viewport, the new user location in Houston, is a McDonald's address query, where the user looks for the exact location of McDonald's in the area of Austin.  
  • The location modifier and viewport are used to calculate the distance of the demotions Client position.
8 0
4 years ago
true or false? in a known-plaintext attack (kpa), the cryptanalyst hs access only to a segment of encrpted data and has no choic
bulgar [2K]

Yes , it’s true. In a known-plaintext attack (kpa), the cryptanalyst can only view a small portion of encrypted data, and he or she has no control over what that data might be.

The attacker also has access to one or more pairs of plaintext/ciphertext in a Known Plaintext Attack (KPA). Specifically, consider the scenario where key and plaintext were used to derive the ciphertext (either of which the attacker is trying to find). The attacker is also aware of what are the locations of the output from key encrypting. That is, the assailant is aware of a pair. They might be familiar with further pairings (obtained with the same key).

A straightforward illustration would be if the unencrypted messages had a set expiration date after which they would become publicly available. such as the location of a planned public event. The coordinates are encrypted and kept secret prior to the event. But when the incident occurs, the attacker has discovered the value of the coordinates /plaintext while the coordinates were decrypted (without knowing the key).

In general, a cipher is easier to break the more plaintext/ciphertext pairs that are known.

To learn more about Plaintext Attack click here:

brainly.com/question/28445346

#SPJ4

6 0
1 year ago
Which of the following is NOT a way the media communicates unrealistic body images?
Leokris [45]

The media communicates unrealistic body image through various ways, which are mentioned in the available options for the question. It definitely digitally alters images that they use for their various publications, and it also provides forums to discuss actor and actresses, including their looks.

The media also often criticizes high-profile individual’s current body condition – whether they are too underweight or too overweight. Thus, the best answer for the question would be (D) promoting all body types.

6 0
3 years ago
Read 2 more answers
Households play a role in the circular flow of goods by
BaLLatris [955]

Answer:

People in households buy goods and services from businesses in an attempt to satisfy their unlimited needs and wants.

Explanation:

Households also sell their labor, land, and capital in exchange for income that they use to buy goods and services that firms produce.

6 0
3 years ago
The Online Shopping system facilitates the customer to view the products, inquire about the product details, and product availab
jeyben [28]

Answer:

see explaination

Explanation:

We will consider the five Actors in the prearranged Online shopping software system:

Customer:

The scheme allows the customer to do below mention actions:

View goods and inquire about the niceties of products and their ease of use.

To create version to be able to purchase invention from the structure.

Browse crop through search category or shortest search alternative.

Place order for the necessary crop.

Make sum for the order(s) positioned.

Payment System:

Payment system allows client to pay using subsequent two methods:

Credit card.

PayPal.

Seller:

System allow seller to perform underneath actions:

Place the foodstuffs for selling under apposite product category.

Create account to happen to a member.

Administrator:

Following actions are perform by Admin:

Manage the goods posted in the system.

Modify existing manufactured goods categories or add novel categories for foodstuffs.

Site Manager:

System privileges Site director with the following role in the system:

View information on:

Orders Placed by customer

Products added by seller

Accounts created by users

check attachment

3 0
3 years ago
Other questions:
  • An attribute whose value uniquely identifies an object is called a(n) _______.​
    15·1 answer
  • An email address is made up of all of the following parts except
    13·2 answers
  • Which nmap switch is used to detect target OS and services?<br> a -S<br> b -p<br> c -F<br> d -A
    8·1 answer
  • Your company runs several databases on a single MySQL instance. They need to take backups of a specific database at regular inte
    12·1 answer
  • Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single i
    15·1 answer
  • A finally clause will execute:
    8·1 answer
  • Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the us
    11·1 answer
  • In cell B13, create a formula without a function using absolute references that subtracts the values of cells B5 and
    13·1 answer
  • What reforms were made by the British government in India after the war of independence? write any three
    5·1 answer
  • Write a java code to print Multiplication Table Till 20
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!