1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
3 years ago
6

You are given a 6x8 (6 rows, 8 columns) array of integers, x, already initialized and three integer variables: max, i and j. Wri

te the necessary code so that max will have the largest value in the array x.
Computers and Technology
1 answer:
Aneli [31]3 years ago
5 0

Answer:

The code is mentioned below.

Explanation:

This code is written in C.

Assuming that an array of 6 by 8 is already initialized and stored in a vector

x[6][8]

which will be called or referred in program by:

x [i] [j]

Alongwith the array the variables i j and max will be initialized as integers.

CODE:

int i,j,max;

max=0;

for(i=0;i<6;i++)

{

for(j=0;j<6;j++)

{

if(max>x[i][j])

max = x[i][j];

}

}

This code will check each and every entry of 6 by 8 array and place the largest value in max.

You might be interested in
What two items must be passed in a tuple to the socket module's connect method in order to connect a socket? (choose two.)
Gekata [30.6K]

The amount of data that can be read from the socket in bytes at most.

<h3>What is socket?</h3>
  • Using socket endpoints on top of the operating system, the "socket" module specifies how server and client machines can communicate at the hardware level.
  • Both connection-oriented and connectionless network protocols are supported by the "socket" API.
  • Using socket endpoints on top of the operating system, the "socket" module specifies how server and client machines can communicate at the hardware level.
  • Both connection-oriented and connectionless network protocols are supported by the "socket" API.
  • An implementation of sockets in a library allows you to use them in your software for Internet communication.

To learn more about socket, refer to:

brainly.com/question/27814017

#SPJ4

6 0
1 year ago
A cathedral hull allows the boat to do what
Hoochie [10]
It allows power boats to have stability while cruising. The cathedral hull  is like a trimaran in terehat it has one main  and two side hulls stuck together so that has a somewhat square to rectangular shape and therefore exhibits greater stability than a single hulled boat. It became more popular with the advent of fibreglass boats in the 1960's and '70s.
5 0
3 years ago
Which of these is system software? Check all
Darya [45]

Answer:

Windows OS is software....

6 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
Every computer consists of physical components and nonphysical components. the nonphysical components of a computer that underst
IrinaVladis [17]
Physical component means Computer Hardware which you can touch and non Physical component means Software, which you can not touch. nonphysical component designed specially for physically component. like Microsoft company designed Software according the Hardware for example Microsoft windows 64 bit could not install on which 32 bit Architecture Hardware.
7 0
3 years ago
Other questions:
  • You have two LANs connected via a router. Network 1 has a DHCP server with a single Ethernet interface. Network 2 does not have
    9·2 answers
  • A company has developed a business-critical system for its core automation process with a software vendor. Which of the followin
    12·1 answer
  • What is microsoft excel
    12·1 answer
  • How has technology influenced space exploration?
    13·1 answer
  • A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provi
    7·1 answer
  • The top of a ladder must extend how many feet above the surface a worker is climbing onto?
    7·1 answer
  • Lisa is modifying a spreadsheet. Which view will allow Lisa to see how her changes will look when she prints the spreadsheet?
    13·2 answers
  • I need 3 sentences on adware.<br> What they do and how they are a risk.
    5·1 answer
  • A _ shows the end of a page . ​
    11·2 answers
  • Assume the user responds with a 3 for the first number and a 5 for the second number.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!