1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
7

Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial

ized -- its value is the address of some int variable.
Computers and Technology
1 answer:
Mazyrski [523]3 years ago
7 0

Answer:

The correct answer for the given question is  :4 **strikeCounter

Explanation:

This question is incomplete the correct question is we have to find  an expression that value is 4  times the value of the variable that strikeCounter is pointing to.

Here strikeCounter is a pointer variable that means it holds the address of another variable As mention in the question strikeCounter is holding the address of of some int variable. In pointer  *(asterisk) symbol is used to read the value of pointer variable thats why we using asterisk and also we have find the 4  times the value of the pointer variable .

So  4 **strikeCounter is correct expression.

You might be interested in
Identify the parts used in an electric circuit- Tiles
Svetlanka [38]
<span>
battery = </span>a source of energy<span>
buzzer = </span>electric energy into sound energy<span>
motor = </span>a device used to transfer electric energy into motion<span>
off switch = </span><span>a device used to break the flow of current</span><span>
</span>
3 0
2 years ago
Read 2 more answers
He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
arsen [322]

Answer: LAN(Local area network)

Explanation:

Local area network(LAN) is the network that is made to cover small amount for area for providing network and computer services.It can usually span in the areas such as a personal room, single building etc.

  • It connects different peripheral devices like printer, switches, tabs etc with the computing system in small certain areas.
  • According to the question, the individual should use LAN network for linking computer with the printer device.
  • As the person has connected laptops, tablets,smartphones, network of printer etc within a network in single space, he is interacting these devices using local area network.
6 0
2 years ago
Create a bulleted list of four descriptive terms describing possible values a person may have. These may be your own values, or
Minchanka [31]
Create a bulleted list of four descriptive terms describing possible values a person may have.

* always be true to yourself
* honesty is the best policy
* making mistakes leads you to solutions
* it's ok to be wrong
7 0
3 years ago
output device is any peripheral to provide data and control signal to ab information processing system​
nirvana33 [79]

Answer:

Its false ita not "output" its "input"

7 0
2 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
2 years ago
Other questions:
  • Define the missing function. licenseNum is created as: (100000 * customID) + licenseYear. Sample output:
    10·2 answers
  • Word offers a multitude of picture formatting options that allow you to flip, rotate, and make many other adjustments to inserte
    15·1 answer
  • Describe how computer is in the last 35 years
    6·1 answer
  • How to get the absolute value in coding begginners?
    13·2 answers
  • The part of the computer that contains the brain or the Central Park nursing unit is also known as
    10·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • When your grounded and the only thing you can get on is a computer........................oh welllllllllllllllllllllllllllllllll
    7·1 answer
  • A large number of consecutive IP addresses are available starting at 198.16.0.0. Suppose that four organizations, Able, Baker, C
    11·1 answer
  • Hello i need help whats -5 = 500
    13·2 answers
  • Questic
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!