1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pachacha [2.7K]
3 years ago
6

Explain how arrays are stored in memory? Show how arr [5] is stored in the memory. Assume each memory location is one byte long

Computers and Technology
1 answer:
Black_prince [1.1K]3 years ago
8 0

Explanation:

Array is collection of similar data types it is a linear data structure.Array stores elements in a contiguous memory location.

We have an array arr[5]  of size 5 and it is of integer type.Suppose the starting address of the array is 2000 and each memory location is one byte long.As we know that the size of integer is 2 or 4 bytes we take it 2 bytes.

If the starting address is 2000 that is of index 0 then the address of index 1 is 2000+2=2002.

address of index 2=2004.

address of index 3=2006.

address of index 4=2008.

Since size of int is 2 bytes hence we add two memory location.

You might be interested in
Between which zones and a DMZ should firewalls be placed? Choose two answers.
brilliants [131]

Answer:

Internal and External Zones

Explanation:

Demilitarized Zone (DMZ) in a network means that, we make sure the security of network at higher level as military make sure the security of their bases or zones.

In this type of network, The network of the internal organization (LAN) needs security from hackers and unauthorized users who are trying to access the resources and information from the network.

This network is divided into two major zones. A DMZ has been placed between two zones along with firewalls enhance the security of LAN Network from the networks on internet. These two zones are named as Internal and External Zone. The firewall between DMZ and External zones monitors the users from external networks on the internet who tries to access organization's network. Internal network monitors the traffic between DMZ and Internal LAN network.

4 0
3 years ago
#Write a function called "scramble" that accepts a string #as an argument and returns a new string. The new string #should start
mojhsa [17]

Answer:

def scramble(s):

   if len(s) % 2 == 1:

       index = int(len(s)//2)

   else:

       index = int(len(s)/2)

   

   return s[index:] + s[:index]

Explanation:

Create a function called scramble that takes one parameter, s

Check the length of the s using len function. If the length is odd, set the index as the floor of the length/2. Otherwise, set the index as length/2. Use index value to slice the s as two halves

Return the second half of the s and the second half of the s using slice notation (s[index:] represents the characters from half of the s to the end, s[:index] represents the characters from begining to the half of the s)

8 0
4 years ago
How will Information Technology Fundamental improve on nursing career.​
ratelena [41]

Answer:

One of the primary ways that informatics has changed nursing practice is through documentation. ... Health informatics is also an important part of care coordination in nursing. The ability to track staffing, workflow and communication can help nurses to identify areas where current processes can be improved.

3 0
2 years ago
Read 2 more answers
You work part time at a computer repair store. You are in the process of building a new computer system. The customer wants a mo
kumpel [21]

Answer:

Building of a New Computer System

Explanation:

Specification

a motherboard having dual core 64 bit dual core processor with 8 GB RAM of dual channel memory support with 16x PCI Express slot for video card and firewire support.

8 0
3 years ago
Do you think the rise of Pinterest indicates a turning point for the world of social media?
kotykmax [81]
Yes because Pinterest sort of controls the internet with most apple phones using pinterest
5 0
3 years ago
Read 2 more answers
Other questions:
  • Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritat
    7·1 answer
  • What is an example of a good URL?
    7·2 answers
  • Which of the following attributes of a website indicates a more reliable source for information?
    8·1 answer
  • Why is charles babbage known as father of computer?​
    10·1 answer
  • A Tracking Gantt chart is based on the percentage of work completed for project tasks or the actual start and finish dates. True
    12·1 answer
  • An invisible path determining the way of travel from one place to another.
    10·1 answer
  • Can anybody answer this
    11·1 answer
  • Define a function below, filter_out_strs, which takes a single argument of type list. Complete the function so that it returns a
    10·1 answer
  • PLEASE HELP ME GIVING BRAINLIEST!!<br> 3.4.3: Go Down Slide: Part one
    5·1 answer
  • Which of the following recommendations should you follow when placing access points to provide wireless access for users within
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!