1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuliya22 [10]
3 years ago
10

Dimensional arrays can be created using loops. 2 dimensional arrays can be created using:

Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
7 0

Answer:

b-Nested Loops

Explanation:

To create a 1-D array we use single loop.For example:-

int a[10];

for(int i=0;i<10;i++)

{

    cin>>a[i];

}

Taking input of a 1-D array.

For creating a 2-D array we use nested loops.

int a[row][column];

for(int i=0;i<row;i++)

{

    for(int j=0;j<column;j++)

    {

          cin>>a[i][j];

    }

}

Hence the answer for this question is nested loops.

You might be interested in
Which of these parts of a computer produces an observable result?
lara31 [8.8K]

Answer:

D

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following are good backup methods you can use to protect important files and folders from loss in the case of a har
grigory [225]

Answer:A,B, and D

Explanation:

6 0
3 years ago
Read 2 more answers
Mathematics and modern technology​
coldgirl [10]

Answer:

where is the question ???? breh

6 0
3 years ago
The actual database of Active Directory shared resources is stored on one or more computers designated as:
RideAnS [48]

Answer:

2. domain controllers.

Explanation:

  • A domain is defined as a collection of users, computers, database servers, etc that are grouped together for some common purpose.
  • The database of these shared groups and resources is stored on one or more computers known as domain controllers.
  • It is a server that manages these groups that work together on the same network.
  • It is also responsible for administrating security and managing permissions in order to control access to the resources which are shared between multiple computers and users in one or more domains.
  • These permissions involve user authentication and authorization. Domain controllers is used to acknowledge authentication requests of users by verifying their username and password.
  • Domain controllers simplify security management in larger networks.
  • However domain controller serves need more hardware and resources for the purpose of securing shared information.
5 0
3 years ago
What can I do with this? Lol
nikitadnepr [17]
Do with what? If you have a question please contact me ;)
3 0
3 years ago
Other questions:
  • What are two reasons network devices are typically accessed through a cli?
    12·1 answer
  • Why is it important to match the latencies fo the older modules to the newer modules?
    14·1 answer
  • The major types of wireless media are______________.
    6·1 answer
  • What technology would it take to make a balloon that doesn't pop?
    6·1 answer
  • Freeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee points
    14·2 answers
  • Which of the following can computer maintenance software determine?
    6·1 answer
  • 3. Compilers and Assemblers translate each source file individually to generate object code files. Hence the object files need t
    13·1 answer
  • What method does a gsm network use to separate data on a channel?
    12·1 answer
  • Ryan is developing a camera app for iOS with the following objectives: make it easier for users to choose and sort pictures; and
    8·1 answer
  • a transport layer security (tls) virtual private network (vpn) requires a remote access server listening on port 443 to encrypt
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!