1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
4 years ago
13

The purpose of this assignment is to gain an understanding of the different variable type binding. You will write three function

s in C or C : one that declares a large array statically, one that declares the same large array on the stack, and one that creates the same large array from the heap. Call each of the subprograms a large number of times (at least 100,000) and output the time required by each (Timing of the execution time of each function should be computed within the function). Explain the results.
Computers and Technology
1 answer:
SpyIntel [72]4 years ago
3 0

Answer:

20!!!

Explanation:

You might be interested in
In the Dread Pirate Roberts case, U.S. Ulbricht, 31 F. Supp. 3D 54D (S.D.N.Y. 2014), one of the issues that the court addressed
LUCKY_DIMON [66]

Answer:

True.

Explanation:

One of the problems described by that of the court through the Dread Pirate Roberts case was about whether Bitcoin was currency of cash-laundering laws reasons. The following court decided in the following scenario that somebody might breach the money-laundering law through using bitcoin.

So, the following scenario is true about the case of Dread Pirate Roberts.

6 0
3 years ago
Write Java code that creates an array of n integers myArray, by taking n integers from the user with duplications, and do the fo
skad [1K]

Answer:

this should be what you need

Explanation:

import java.util.*;

public class ABC{

 public static void main(String[] args) {

   int n;

   //create scanner object

   Scanner sc = new Scanner(System.in);

   //ask for size of array

   System.out.print("Enter the size of array (n): ");

   //read the input

   n = sc.nextInt();

   //create an array of n length

   int [] myArray = new int[n];

   //ask user for array elements

   System.out.printf("Enter %d integers: ", n);

   //read array elements

   for(int i =0 ;i <5; i++)

     myArray[i] = sc.nextInt();

   

   //print the elements if myArray

   System.out.print("1 - The values of myArray are: [");

   for(int i =0 ; i < n; i++){

     System.out.print(myArray[i]);

     if(i < n-1)

       System.out.print(", ");

   }

   System.out.print("]\n");

   //calculate mean and sum of myArray elements

   int sum = 0;

   double mean = 0;

   for(int i = 0; i < n; i++)

     sum += myArray[i];

   

   mean = (sum*1.0)/n;

   //print the sum and mean of myArray

   System.out.printf("2 - The sum is: %d. The mean is: %.1f\n", sum, mean);

     

   //create an arraylist

   ArrayList<Integer> myArrayList = new ArrayList<Integer>();

   //copy the value of myArray to an arraylist without duplicates

   for(int i = 0; i < n; i++){

     if(!myArrayList.contains(myArray[i]))

       myArrayList.add(myArray[i]);

   }

   sum = 0; mean = 0;

   //display the values of myArrayList

   System.out.print("3 - The values of myArrayList are: [");

   for(int i =0 ; i < myArrayList.size(); i++){

     System.out.print(myArrayList.get(i));

     if(i < myArrayList.size()-1)

       System.out.print(", ");

   }

   System.out.print("]\n");

   //calculate sum and mean of myArrayList elements

   for(int i = 0; i < myArrayList.size(); i++)

     sum += myArrayList.get(i);

   mean = (sum*1.0)/myArrayList.size();

   //print the sum and mean of myArrayList

   System.out.printf("4 - The sum is: %d. The mean is: %.2f\n", sum, mean);

 }

}

3 0
3 years ago
This common technique, employed at the edge of a network, eliminates the need for public IP addresses on a private network while
NNADVOKAT [17]

Answer:

NAT

Explanation:

Network Address Translation (NAT) allows nonroutable IP prefixes to hide behind a routable address.it translates IP addresses and ports of its internal hosts, hiding the true endpoint of an internal host on a private network.

Using NAT in this way allows network engineers to efficiently route internal network traffic to the same resources, and allow access to more ports, while restricting access at the firewall.

4 0
3 years ago
Which of the following is NOT one of the three main ways to control a program when writing code?
Karo-lina-s [1.5K]
B. Derivative (Sorry If It’s Wrong)
5 0
3 years ago
Read 2 more answers
. Write a code to define a linked list node using the above defined structure student (i.e. the data of the node is a student st
enyata [817]

Answer:

struct node{

   student data;

   node* next;

};

Explanation:

The above written is the segment of code is the structure of node of the linked list.The data of the node is type student.So the data of the node of the linked list will consist of the student details and the next is the pointer which holds the address of the next node.

8 0
4 years ago
Other questions:
  • You are using a tool on your computer to organize a variety of files in folders. what is the term for this kind of tool?
    14·2 answers
  • If your computers normal zoom is 100, but it looks like its at 500, how do you stop that? my invisioned thing isn't on, neither
    9·1 answer
  • Which of the following illustrates an example of a string data type?
    15·2 answers
  • when you type a day, month, or date, what features does Word use to automatically complete typing the day, month, or date for yo
    6·1 answer
  • The time delay of a long-distance call can be determined by multiplying a small fixed constant by the number of communication li
    8·1 answer
  • If you are going to refer to a few dozen classes in your application, how do<br> you do it?
    6·1 answer
  • --------------------------------------------------------------------------------------------------------------------------------
    8·1 answer
  • Imagine that you are preparing a multimedia presentation. What are the four things you need to consider when getting started?
    14·2 answers
  • What stage of the development process is often called the pre-alpha phase and is the "meat" of the design process where features
    5·1 answer
  • How to set horizontal text alignment​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!