1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
6

. Which of the following is NOT a valid declaration for a character string?

Computers and Technology
1 answer:
melomori [17]3 years ago
4 0

Answer:

a) char string1[3] = {“1”, “2”, ‘3’, 4}

Explanation:

From the given options the option a is not a valid declaration.

We are declaring an array of characters string1 also known as c string.Whose size is 3.So it can only hold 3 characters and the third character should be Null(\0) character and we are providing it 4 elements from which 2 of them are strings,one is character and an integer 4.

You might be interested in
The writers that most likely influenced our Founding Fathers were _____. Select all that apply. Swift and Bacon Marlowe and Kant
Feliz [49]

Locke and Voltaire, Spinoza and Rousseau.

8 0
3 years ago
Read 2 more answers
Write 2-3 lines about the Basic operations of computer
crimeas [40]

Answer:

1. A computer is a machine that carries out arithmetic and logical operations. 2. A computer has two main components- hardware and software. 3. internet runs on computers,

connecting billions of computers the world over

6 0
4 years ago
If you have a second Ethernet adapter, which network location is being used by the adapter?
yuradex [85]

Answer:

Public network

Explanation:

The network includes different networks and settings for sharing which are applied to the network which you are connected to.

A public network is being used by the adapter. The public network is a network that is unrestrictive. That is, any member of the public can easily have access to it and connect to the internet. Such a network exposed users to risks by exposing the connected devices.

3 0
3 years ago
Why are there 2 types of ip addresses like 172.16.254.1 or 2001:db8:0:1234:0:567:8:1?
solong [7]
The first example is an IPv4 address. Because IPv4 is only 32 bits long there are only about 4 billion addresses available. To expand the address space IPv6 came into existence and your second example is an IPv6 address.
7 0
3 years ago
Which scenario describes a student citing an online source in his or her work?
dimaraw [331]

Answer:

D Ling includes the name of a source’s author in her report.

Explanation: just use it lol

4 0
3 years ago
Read 2 more answers
Other questions:
  • What is some advice you would give someone who is just starting online learning 2 sentences
    8·1 answer
  • When can you message on brainly? My account says I have to answer more questions first.
    6·1 answer
  • Linux is a kind of software whose code is provided for use, modification, and redistribution. what kind of software is this?
    5·1 answer
  • There are some network modeling tools that can ________ the existing network.
    12·2 answers
  • From Blown to Bits why is it important to know what children are doing on the Web Tonight?
    7·1 answer
  • Briefly explain why corporations are increasingly interested in using Unix or Linux for their operating systems.
    5·1 answer
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • Why is translator required ​
    11·1 answer
  • An operating system with _____ capabilities allows a user to run more than one program concurrently.
    6·1 answer
  • which of the following is acomputer program that detects, prevents. and takes action sto deactivate or remove malicious programm
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!