Answer:
#include <stdio.h>
void printValues ( unsigned char *ptr, int count) // count is no of cells
{
for(int i=0; i<count; i++) {
printf("%d ", ptr[i]);
}
}
int main ( )
{
unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;
printValues( data, sizeof(data)/sizeof(data[0]) );
}
Explanation:
Remember that the sizeof() mechanism fails if a pointer to the data is passed to a function. That's why the count variable is needed in the first place.
Every application has access to specific opened port. If you only make a exception for the specific application only that application can bypass the firewall.
"Key logger" This could be software or hardware that does this.
<h2><u>Given</u> :-</h2>
Create a HTML code for writing a web page for your school time-table.
<h2><u>Answer</u> :-</h2>
<html>
<head>
<title> Time Table </title>
</head>
<hrcolor = "red">
<hrcolor = "blue">
<body>
<table><tr = "7"><md = "7"><Period 1_></table>
</body>
</html>
Answered by - ItzMaster
Program Pseudocode graphically present the detailed sequence of steps needed to solve a programming problem.
<h3>What are Pseudocode?</h3>
These are known to be a set of codes that a program has graphically depicted all of its sequence of steps that can be sued to handle a programming problem.
Note that Pseudocode is a form of artificial and man made informal language that is often used by programmers to create algorithms.
Learn more about Program from
brainly.com/question/153827
#SPJ1