1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
7

Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial

ized -- its value is the address of some int variable.
Computers and Technology
1 answer:
Mazyrski [523]3 years ago
7 0

Answer:

The correct answer for the given question is  :4 **strikeCounter

Explanation:

This question is incomplete the correct question is we have to find  an expression that value is 4  times the value of the variable that strikeCounter is pointing to.

Here strikeCounter is a pointer variable that means it holds the address of another variable As mention in the question strikeCounter is holding the address of of some int variable. In pointer  *(asterisk) symbol is used to read the value of pointer variable thats why we using asterisk and also we have find the 4  times the value of the pointer variable .

So  4 **strikeCounter is correct expression.

You might be interested in
True or False. A list can have only the same data type values.
shepuryov [24]

the answer its false.

hope this helps

6 0
3 years ago
Bob gets an e-mail addressed from his bank, asking for his user ID and password. He then notices that the e-mail has poor gramma
Arlecino [84]

This type of attack is called as phishing emails.

<u>Explanation:</u>

Normally any bank will not ask end user about login details such user id, password, pin number in email. So bob as think and before responding the mail. Moreover this type email to be considered as hacker email, who want to access the bob accounts and do access his account and steal money from bob accounts.

Luckily bob contacted bank to stop further hackers not to his accounts. Since it is grammar mistake bob understood it is hackers who asking bob user id and password.

Bob has prompted these type of mails are called phishing emails. Better to avoid it.

6 0
3 years ago
About how many jobs in the United States require Microsoft expertise?
GarryVolchara [31]
Answer: C because bill gates is the owner
5 0
3 years ago
When a subdomain has been delegated to a zone on another server, the DNS server hosting the parent zone maintains only an NS rec
Vedmedyk [2.9K]

Answer:

True of False?

True

Explanation:

Different sub domains can be directed to different IPs servers but a client server cannot be forced to keep looking at name servers for additional records.

To delegate a subdomain to a zone on another server, one would need to add NS-records for the sub-domain name. This would point to the host names of the DNS servers hosting the sub-domain - in the parent zone.

In the "DNS records" window right-click the parent zone in the left list and select "New NS-record":

8 0
4 years ago
The procurement department of an organization helps to program software. <br> A)True<br> B)False
valina [46]
I think it is true absolutely
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which building-block feature is available in the Text grouping on the Insert tab?
    14·1 answer
  • Speed in a given direction is called
    12·2 answers
  • Li Chang has recently started his own business. He plans to launch his design for an application (app) for a smartphone. All of
    9·1 answer
  • PLEASE HELP ASAP!!! 50 POINTS FOR TWO DIGITAL TECHNOLOGY MULTIPLE CHOICE QUESTIONS!!!
    13·1 answer
  • What are three recommendations for reducing risk and improving the privacy of your personal information while using social media
    13·1 answer
  • A presentation is widely used to present ______ and ______ effectively​
    12·1 answer
  • Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
    6·1 answer
  • PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regardi
    7·1 answer
  • What are the benefits and drawbacks of a desktop utilising virtualisation and a server?
    12·1 answer
  • Loops are frequently used to ____; that is, to make sure it is meaningful and useful.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!