1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MA_775_DIABLO [31]
3 years ago
7

Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial

ized -- its value is the address of some int variable.
Computers and Technology
1 answer:
Mazyrski [523]3 years ago
7 0

Answer:

The correct answer for the given question is  :4 **strikeCounter

Explanation:

This question is incomplete the correct question is we have to find  an expression that value is 4  times the value of the variable that strikeCounter is pointing to.

Here strikeCounter is a pointer variable that means it holds the address of another variable As mention in the question strikeCounter is holding the address of of some int variable. In pointer  *(asterisk) symbol is used to read the value of pointer variable thats why we using asterisk and also we have find the 4  times the value of the pointer variable .

So  4 **strikeCounter is correct expression.

You might be interested in
When you perform a Google search that uses the word "and" (for example: "Restaurant AND Houston"), which kind of logic are you u
Andrej [43]

Answer:

Ordered pairing because binary has zero coding language in it so if we use ordered pairing then we can use and to combine the words.

8 0
3 years ago
Read 2 more answers
A great way to avoid tech distraction is to __
Ksivusya [100]

Answer:

B

Explanation:

This is because you are only restraining yourself from using your phone when you are NOT at the stop lights (or you could perhaps say Red Lights). I hope this was helpful! :)

4 0
3 years ago
Read 2 more answers
Please help me ASAP!
VARVARA [1.3K]

Answer:

security hacker

Explanation:

security hackers are people who hack software to check for vulnerabilities. most of the time security hackers are white hat hackers who work to perform penetration tests to see if a software is secure.

tell me if this is wrong :)

6 0
3 years ago
Read 2 more answers
In setting up a small office network, the network administrator decides to assign private IP addresses dynamically to workstatio
dezoksy [38]

Answer:

It is the DHCP server, or the Dynamic host configuration protocol. And it is responsible for assigning dynamic IP Addresses, It also does the  configuration of database the subnet mask, default gateway, and the dns server. It is by default disabled. And we need to enable it. And hence the answer is the DHCP server, that we need to enable on the router, for ensuring that the office devices are able to access the internet.

Explanation:

The answer is self explanatory.

7 0
3 years ago
Not a subject question but please help
Doss [256]

Answer:

You go to account settings, edit your profile and click preferences and then go to choose level and put which grade u are in the options r middle school, high school, and college

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • In Excel, an individual cell is the intersection of a row and a column.<br> True<br> False
    10·2 answers
  • Which of the following is considered both an input and output peripheral?
    10·1 answer
  • When configuring services, what linux directory typically contains server configuration files?
    8·1 answer
  • Digital libraries are often available to students and/or employees at colleges, schools, and BLANK institutions.
    15·1 answer
  • What information should you avoid sharing when updating your status?
    14·2 answers
  • What is the definition of D1-D4?
    14·1 answer
  • Use the Bisection Method to find the root 2. Write a main program and a function program 3. Main Program a. define constants b.
    9·1 answer
  • In the view that follows, which field can't be updated create view example_2 as select invoice_number, invoice_date, invoice_tot
    13·1 answer
  • An employee clicks on a link in an email from what looks like a fellow employee and is taken to a fraudulent web site which asks
    6·2 answers
  • Given that the input A is false, the input B is false, and the input C is true, what is the resulting value of the output?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!