1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tigry1 [53]
3 years ago
6

Write a complete C program to run on the MSP432 platform to do the following:

Computers and Technology
1 answer:
Butoxors [25]3 years ago
8 0

Answer:

The C code is given below with appropriate comments

Explanation:

#include <stdio.h>

int main()

{

//array declaration

int arr[3][7], cumulativeSum = 0;

 

//initialize the array

for(int i=0; i<3; i++)

{

for(int j=0; j<7; j++)

{

arr[i][j] = i+j;

}

}

//calculate the cumulative sum

for(int i=0; i<3; i++)

{

for(int j=0; j<7; j++)

{

if((arr[i][j] % 5) != 0)

{

cumulativeSum += arr[i][j];

arr[i][j] = 0;

}

}

}

 

//display the final array

printf("The final array is: \n\n");

for(int i=0; i<3; i++)

{

for(int j=0; j<7; j++)

{

printf("%d ", arr[i][j]);

}

printf("\n");

}

 

//display the cumulative sum

printf("\nCumulative Sum = %d", cumulativeSum);

return 0;

}

You might be interested in
Help me asap ill give brainliest
kobusy [5.1K]

Answer:

Give me brainliest thanks

6 0
3 years ago
Software that translates the sound of human voice into text is called:________.
S_A_V [24]

Answer:

C) speech recognition software.

Explanation:

Software that translates the sound of human voice into text is called a speech recognition software.

In Computer science, a speech recognition software is a voice technology application or program which enables the conversion of human voice such as spoken language to computer commands such as text through the use of speech recognition algorithms.

Some examples of speech recognition software are HTK, Kaldi, Voice navigator, Julius etc.

6 0
3 years ago
When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
Simora [160]

Answer:

Authorization is granting permission for admittance. ACLs provide file system security for protecting files managed by the user. Rule-Based Access Control can be changed by users.

Explanation:

8 0
3 years ago
How is the Internet Simulator similar to the Actual Internet? How is it different?
masya89 [10]
The Internet Simulator is a tool developed by Code.org for our new high school Computer Science Principles class. ... The Internet Simulator was designed to be used in a classroom with students working collaboratively in-person to solve problems.
4 0
4 years ago
Software is the brain of computer. Explain this starement
Annette [7]

here you go

i hope this helps you

5 0
3 years ago
Other questions:
  • Ninety-two percent of the new information was stored on magnetic media, mostly in _____.
    11·1 answer
  • Preesure is drived quantity? why​
    15·2 answers
  • Should the existing system be replaced?This is a question that is asked during the _____ stage of the Systems Development Life C
    8·1 answer
  • What are some options available in the Spelling and Grammar Checker? Check all that apply. Change and Change All Redo and Repeat
    15·2 answers
  • Write a game that plays many rounds of Rock Paper Scissors. The user and computer will each choose between three items: rock (de
    8·1 answer
  • Light the<br> Spark hop<br> Answer if ur a baddie;)))
    9·2 answers
  • Using the Insert tab, you can convert text into a table and a table into text.
    15·1 answer
  • Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enou
    13·1 answer
  • In which situation is coauthoring of presentations primarily utilized?
    13·2 answers
  • Which of the following is true of lossy and lossless compression techniques?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!