1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elanso [62]
3 years ago
9

Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void

. It should look like this {5,10,8,9,1}
Computers and Technology
1 answer:
nikitadnepr [17]3 years ago
5 0

Answer:

void printarr(int nums[],int n)

{

   cout<<"{";//printing { before the elements.

   for(int i=0;i<n;i++) // iterating over the array.

   {

       cout<<nums[i];//printing the elements.

       if(i==n-1)//if last element then come out of the loop.

       break;

       cout<<",";//printing the comma.

   }

   cout<<"}"<<endl;//printing } at the end.

}

Output:-

5

1 2 3 4 5

{1,2,3,4,5}

Explanation:

I have created a function printarr of type void which prints the array elements in one line.I have used for loop to iterate over the array elements.Everything else is mentioned in the comments.

You might be interested in
I NEED HELP SOMEONE HELP ME PLEASE
kirill115 [55]
1. non photorealistic rendering
2. siftables
3. spherical audio
4. blu ray
7 0
3 years ago
Why do you feel an organization has multiple layers of security in place to protect its operation?
aalyn [17]

The purpose of including multiple layers in your network security<span> is to make sure that </span>each single defense component has a backup<span> in the case of a flaw or missing coverage. The individual strengths of each layer also cover any gaps that other defenses may lack.</span>

With this assumption in mind, each individual layer in a multi-layered security approach focuses on a specific area where the malware could attack. By working in concert, these layers of security offer a better chance of stopping intruders from breaching company networks than using a single solution.

The types of security layers you can use in your network defense include:

<span>Web protectionPatch managementEmail security and archivingVulnerability assessment and analyticsAntivirus softwareData encryptionFirewallsDigital certificatesAnti-spam and spam filtersPrivacy controls</span>

<span>Having multiple layers of security in place is crucial for MSPs who protect data at all levels and across numerous applications and devices. Not only should data stay safe, but so should the methods of communication and the network where information is transferred.</span>

4 0
3 years ago
What are all the physical components called?
Alecsey [184]

Physical Components to a computer are called hardware.

3 0
4 years ago
"Write code that prints: Ready! countNum ... 2 1 Start! Your code should contain a for loop. Print a newline after each number a
BartSMP [9]

Explanation:

#include <iostream.h>

#inlcude<conion.h>

void main()

{

  int count, x;

  clrscr();

  cout<<"Enter the count:";

  cin>> count;

  cout<<"Ready!\n";

  for(x=count;x>0;x--)

  {

     cout<<x<<"\n";

  }

  cout<<"Start";

  getche();

}

This is a simple program where the output is expected to be in reverse order. So we run a for loop starting from the count and decrements the counter by 1 every time when the loop runs and print the value. So to print the output in "new line" we include "\n".

6 0
3 years ago
I need help with the rest also
dalvyx [7]

Answer:

??? blackkkkkkkkkkkkkkkkk

6 0
2 years ago
Other questions:
  • Should I learn Python, C++, C# or VB to start off programming games for Windows. Open to other language recommendations as well!
    6·1 answer
  • Ou have just set up a network that will use the tcp/ip protocol, and you want client computers to obtain ip configuration automa
    9·1 answer
  • Which is an advantage that electronic scheduling tools have over paper calendars?
    13·2 answers
  • Which represents the hierarchical structure of a Google Analytics account from top to bottom?
    5·1 answer
  • Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
    8·1 answer
  • Describe how a cell’s content and format attributes are related.
    13·2 answers
  • BADM-Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this cou
    7·1 answer
  • A type of authentication that requires the user to provide something that they know, such
    6·1 answer
  • Which actions represent parody?
    5·1 answer
  • 48
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!