1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vaieri [72.5K]
3 years ago
10

Write a function that takes a character string value and prints out the bytes stored in memory of its representation (including

the terminating 0). Test it on a string containing your full name.
Computers and Technology
1 answer:
Goryan [66]3 years ago
6 0

Answer:

C++ code explained below

Explanation:

SOURCE CODE:

*Please follow the comments to better understand the code.

#include <stdio.h>

int numOfBytes(char* string)

{

// initialise the variables

int i=0,size=0;

// while the string reaches to \0, repeat the loop.

while(string[i]!='\0')

{

// add that size

size += sizeof(*string);

 

// increase the i value.

i++;

}

// add 1 byte for \0

size = size+1;

return size;

}

int main() {

char name[]="Praveen Kumar Reddy";

printf("The size is %d bytes.",numOfBytes(name));

 

  return 0;

}

=============

You might be interested in
Which is technologically backward country? Options United States U K CHILE INDIA
agasfer [191]
The answer is India.

There are a lot of factors affecting India in becoming backward in technology competitiveness. 
One factor is producing or exporting lots of engineers to other countries leaving average skills in the country. Second, poor government institutes. Next, problems with budget allocations. 
3 0
3 years ago
The find_item functions uses binary search to recursively locate an item is the list, returning true if found, false otherwise.
bagirrra123 [75]

Answer:

def find_item(listed, item):

   listed.sort()

   #Returns True if the item is in the list, False if not.

   if len(listed) == 0:

       return False

   middle = int(len(listed)/2)

   #Is the item in the first half of the list?

   if item < listed[middle]:

   #Call the function with the first half of the list

       return find_item(listed[:middle], item)

   

   #Is the item in the center of the list?

   if listed[middle] == item:

       return True

   else:

   #Call the function with the second half of the list

       return find_item(listed[middle+1:], item)

   return False

list_of_names = ["Parker", "Drew", "Cameron", "Logan", "Alex", "Chris", "Terry", "Jamie", "Jordan", "Taylor"]

print(find_item(list_of_names, "Alex")) # True

print(find_item(list_of_names, "Andrew")) # False

print(find_item(list_of_names, "Drew")) # True

print(find_item(list_of_names, "Jared")) # False

Explanation:

The defined python function is used to implement a binary search, the function is recursively called in the function statement, but for it to work on the list ( ie, search for an item in the list), the list must be sorted in ascending order (default).

7 0
3 years ago
In windows, a(n) ________ follows the file name and a period and indicates the file type.
larisa [96]
Ans : Extention

In windows, a(n) extension follows the file name and a period and indicates the file type.
4 0
4 years ago
CLS
marusya05 [52]

Answer:

1 1

2

3

5

8

13

21

34

55

Explanation:

i guess this is the answer

8 0
3 years ago
Iman has 48 months to save $18,000, the maximum amount he estimates his first year of college will cost. He does not want to dep
natita [175]
The minimum amount that Iman should save is $375 
8 0
4 years ago
Read 2 more answers
Other questions:
  • Consider the attack scenario given below:
    8·1 answer
  • Description A data retrieval tool that finds specified data within a database A collection of records All of the fields for a si
    7·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • What is an identified component of a software program that might allow a hacker or other intruder to gain entry and control of a
    10·2 answers
  • Can someone please give me two (2) thesis statement for this question?
    5·1 answer
  • When you save a file for the first time, you must ____.
    15·2 answers
  • Advantages of Linux include_____.
    6·1 answer
  • What is the result when you run the following line of code after a prompt??
    5·1 answer
  • Match the ernerging technologies to their descriptions.
    14·1 answer
  • What type of access controls allow the owner of a file to grant other users access to it using an access control list
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!