1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
6

Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a space. Ex: If origList =

{4, 5, 10, 12} and offsetAmount = {2, 4, 7, 3}, print: 6 9 17 15
Computers and Technology
1 answer:
Darya [45]3 years ago
5 0

Answer:

#include <stdio.h>

int main(void) {

const int NUM_VALS = 4;

int origList[NUM_VALS];

int offsetAmount[NUM_VALS];

int i;

origList[0] = 20;

origList[1] = 30;

origList[2] = 40;

origList[3] = 50;

offsetAmount[0] = 5;

offsetAmount[1] = 7;

offsetAmount[2] = 3;

offsetAmount[3] = 4;

for(i=0;i<NUM_VALS;i++)

{

printf("%d ",origList[i]+offsetAmount[i]);

}

printf("\n");

return 0;

}

Explanation:

  • Initialize the origList and offsetAmount variables.
  • Loop up to the value of NUM_VALS variable.
  • Display the output by combining origList and offsetAmount.
You might be interested in
What is true about content based filtering
AleksAgata [21]

Answer: provide more info

Explanation:

8 0
3 years ago
Attackers have recently launched several attacks against servers in your organization’s DMZ. You are tasked with identifying a s
kari74 [83]

Answer:

Option B is correct.

Explanation:

Well into the DMZ corporation of the user, intruders have currently conducted numerous attempts toward networks. He is associated with finding any response which would provide the greatest opportunity in the future to avoid such threats.  

The in-band IPS becomes the better approach for the required choices. Traffic moves via the IPS, as well as it has a better probability of avoiding inner processes through entering invasion.

4 0
3 years ago
: For each of the following words identify the bytethat is stored at lower memory address and the byte that is storedat higher m
Aloiza [94]

Answer:

In a <u>little endian computer</u> -The data's least substantial byte is put at the lower address byte. The remaining information will be put in memory in order in the next three bytes.

a)1234

4 is placed at the least significant bits,so this byte stored at lower memory address.

1 is placed at the most significant bits,so this byte stored at higher memory address.

b) ABFC

C is placed at the least significant bits,so this byte stored at lower memory address.

A is placed at the most significant bits,so this byte stored at higher memory address.

c) B100

0 is placed at the least significant bits,so this byte stored at lower memory address.

B is placed at the most significant bits,so this byte stored at higher memory address.

d) B800

0 is placed at the least significant bits,so this byte stored at lower memory address.

B is placed at the most significant bits,so this byte stored at higher memory address.

5 0
3 years ago
____ is a limited version of windows that allows you to use your mouse, screen, and keyboard but no other peripheral devices.
Gnoma [55]
'SAFEMODE' <span>is a limited version of windows that allows you to use your mouse, screen, and keyboard but no other peripheral devices.</span>
8 0
3 years ago
True or false, cloud storage does not require internet access?
Dmitry_Shevchenko [17]
False, the storage is being accessed from the cloud which can only be accessed through an internet connection.
3 0
3 years ago
Other questions:
  • Demonstrate your grasp of the Unix file system by constructing a directory structure as follows: In your home ( ~ ) directory, c
    11·1 answer
  • If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for
    7·2 answers
  • ________ is an open-source program supported by the Apache Foundation that manages thousands of computers and implements MapRedu
    5·1 answer
  • Asian-American men are often represented in the media as _____.
    8·2 answers
  • Any part of the computer that you plug into the CPU like a phone, tablet, headphones etc. are called
    5·1 answer
  • Carlos has noticed that he has a duplicate slide in his presentation. He would like to delete it. He should _____.
    8·1 answer
  • In python, sorry if it’s blurry
    13·2 answers
  • How do i block somebody on here, theyre making me have a panic attack. /srs
    11·2 answers
  • If html is used to specify the content of the webpage, then what do you use css for?.
    12·1 answer
  • Which keyboard shortcut would you press to copy cells that are selected in a spreadsheet?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!