1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
3 years ago
8

Write a program which populates an array with integer values read from a file. We do not know how many integers are in the file,

so you must loop until the end of the file is reached. For this problem, you may NOT use the function feof(). Instead, use the result returned from fscanf() to determine the end-of-file. Recall, we can set the result of fscanf() to an integer variable, and check to see if the integer variable is equal to the EOF marker. The program must take the items in the array and reverse them. You may use one array only to solve this problem.
Computers and Technology
1 answer:
max2010maxim [7]3 years ago
5 0

Answer:

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

int main()

{

int arr[100];

int i = 0;

int j = 0;

char c[10];

char temp;

int sum = 0;

FILE* fp;

if ((fp = fopen("test.txt", "r")) == NULL) {

printf("cannot open the file");

return;

}

else {

do {

temp = fgetc(fp);

if (temp == ' ' || temp == '\n') {

c[j] = '\0';

arr[i++] = atoi(c);

j = 0;

continue;

}

c[j++] = temp;

} while (temp != EOF);

for (j = i - 1; j >= 0; j--) {

printf("%d\n", arr[j]);

}

}

getchar();

}

Explanation:

You might be interested in
Why is the yellow light blinking on the front of my computer
Yanka [14]

Answer:

that means it needs to get charged or it's on airplane mode not sure what else it could be

6 0
3 years ago
In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac
NemiM [27]

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

4 0
3 years ago
The process that uses 3D modeling software to create a representation of a three dimensional object is called 3D modeling.
MissTica
This statement is (True)
5 0
3 years ago
Read 2 more answers
U2- an example of __________ is an attempt by an unauthorized user to gain access to a system by posing as an authorized user.
Ivan
The answer is "masquerade".
4 0
3 years ago
The CPI is a measure of the overall cost of the goods and services bought by a. a typical consumer, and the CPI is computed and
Akimi4 [234]

Answer:

a typical consumer, and the CPI is computed and reported by the Bureau of Labor Statistics.

Explanation:

The CPI is a measure of the overall cost of the goods and services bought by a typical consumer , and the CPI is computed and reported by the Bureau of labor statistics. Hence, option C is correct.

5 0
3 years ago
Other questions:
  • What is the purpose of this diamond shape in a flowchart?
    8·1 answer
  • A study guide can be created
    6·2 answers
  • What kind of value should an employee possess when employees are expected to be responsible and fair?
    7·1 answer
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • Is your florida learners license number the same as the actual license number?
    14·2 answers
  • Why should ERP architecture include a discussion on organizational structure, business processes, and people, instead of just in
    5·1 answer
  • #include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid &gt; 0 ) { value += 20; } printf(val
    10·1 answer
  • When you're working with a word processing document and you press the DEL Key what happens
    7·2 answers
  • Which network component is used to connect one network to another? Which component delivers the message to the destination compu
    5·1 answer
  • When engineers consider _____, they propose giving up a benefit of one proposed design in order to obtain a benefit of a differe
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!