1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marat540 [252]
3 years ago
7

C++ Proagram

Computers and Technology
1 answer:
lions [1.4K]3 years ago
5 0

Answer:

Replace /* Your solution goes here */

with

for (i = 0; i < SCORES_SIZE-1; ++i) {

bonusScores[i] += bonusScores[i+1];

}

Explanation:

In C++, the index of an array starts from 0 and ends at 1 less than the size of the array;

Using the analysis in the question, the above code (in the answer section) iterates from the index element (element at 0) to the second to the last element (element at size - 2)';

This is to ensure that the element of the array only adds itself and the next element;except for the last index which remains unchanged

The following operation is done in each iteration.

When i = 0,

<em>bonusScores[0] = bonusScores[0] + bonusScores[0+1]; </em>

<em>bonusScores[0] = bonusScores[0] + bonusScores[1]; </em>

<em>bonusScores[0] = 10 + 20</em>

<em>bonusScores[0] = 30</em>

When i = 1,

<em>bonusScores[1] = bonusScores[1] + bonusScores[1+1]; </em>

<em>bonusScores[1] = bonusScores[1] + bonusScores[2]; </em>

<em>bonusScores[1] = 20 + 30</em>

<em>bonusScores[1] = 50</em>

<em />

When i = 2,

<em>bonusScores[2] = bonusScores[2] + bonusScores[2+1]; </em>

<em>bonusScores[2] = bonusScores[2] + bonusScores[3]; </em>

<em>bonusScores[2] = 30 + 40</em>

<em>bonusScores[2] = 70</em>

<em />

<em>This is where the iteration stops</em>

You might be interested in
An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
ddd [48]

The statement 'an embedded system describes computing technology that has been enclosed in protective shielding for security reasons is false.

In the field of computers and technology, an embedded system can be described as a small computer, more overly an integrated chip, that is enclosed in an electronic device in order for making the device to run. The small computer integrated into the device helps in regulating the device. The purpose of an embedded system is not for protective shielding or security reasons hence the statement above is false.

In an embedded system, a combination of computer processor, computer memory, and input/output peripheral devices is present that performs a dedicated function. Microcontrollers are used for the management of an embedded system.

To learn more about embedded system, click here:

brainly.com/question/13014225

#SPJ4

7 0
2 years ago
Electrical pressure is also called
fgiga [73]
Electrical pressure is also known as voltage.

I hope this helps you! :-)
3 0
4 years ago
Read 2 more answers
Why is data processing done in computer
oksian1 [2.3K]

Answer:

Explanation:

Data processing occurs when data is collected and translated into usable information. Usually performed by a data scientist or team of data scientists, it is important for data processing to be done correctly as not to negatively affect the end product, or data output.Any use of computers to perform defined operations on data can be included under data processing.

6 0
3 years ago
When you're working with a word processing document and you press the del key, what happens?
Svetach [21]

The <DEL> or <Delete> key makes the first character AFTER the cursor
disappear, and everything after it then moves back one space to close up
the hole.

Example: 

If I have this in my document ...                          Most trees are green.

And my cursor is after the 'a', like this:                Most trees a|re green.

Now, if I hit the <delete> key, it deletes the
'r' after the cursor, and the hole closes up,
and the cursor stays where it is:                          Most trees a|e green.


5 0
3 years ago
Read 2 more answers
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Trava [24]

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

  • A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.
  • Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.
4 0
3 years ago
Other questions:
  • In this part, you have to implement a linked list that maintains a list of integers in sorted order. Thus, if the list contains
    13·1 answer
  • A device receives a Transmission Control Protocol (TCP) packet. The device understands where the actual data payload begins. Whi
    15·1 answer
  • Angela recently purchased a new Android smartphone. While purchasing the phone, Angela was told that she would need to set up a
    14·1 answer
  • HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical control
    12·1 answer
  • What is the use of jacquard loom
    13·2 answers
  • Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?
    5·1 answer
  • Consider the classes below: public class TestA { public static void main(String[] args) { ​ int x = 2; ​ int y = 20 ​ int counte
    6·1 answer
  • 1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
    7·1 answer
  • Assignment 6: Animation
    7·1 answer
  • Please select the word from the list that best fits the definition<br><br> Plagiarism
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!