1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa86 [58]
3 years ago
10

Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the arra

y. 14 36 31 -2 11 -6 Sample Run [14, 36, 31, -2, 11, -6] (In edhesive please)

Computers and Technology
2 answers:
dem82 [27]3 years ago
5 0

Answer:

nums=[14, 36, 31, -2, 11, -6]

print(nums)

Explanation:

I got a 100%

rodikova [14]3 years ago
4 0

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

    int nums[6] = {14, 36, 31, -2, 11, -6};

    cout<<"[";

    for(int i = 0;i<6;i++){

    cout<<nums[i];

    if(i != 5){cout<<", ";}

    }

    cout<<"]";

   return 0;

}

Explanation:

This initializes the array

    int nums[6] = {14, 36, 31, -2, 11, -6};

This prints the opening square bracket

    cout<<"[";

This iterates through the array

    for(int i = 0;i<6;i++){

This prints individual elements of the array

    cout<<nums[i];

Until the last index, this line prints comma after individual array elements

<em>     if(i != 5){cout<<", ";}</em>

    }

This prints the closing square bracket

    cout<<"]";

You might be interested in
Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
liberstina [14]
<span>NCP are protocols that are used for establishing PPP sessions. </span>During the establishment of a PPP connection that will use the IPv4 network layer protocol the following options are negotiated: the algorithm to compress TCP and IP headers and the IPv4 address used for routing IP over the PPP link.

6 0
3 years ago
Which of the following is a key component to your individual internet safety? government regulations
nexus9112 [7]
It is government regulations and acceptable use policy
3 0
3 years ago
Please help I’ll give brainleistt
iren2701 [21]

Answer:

7. B

8. A

9. B

10. B

11. A

Explanation:

6 0
2 years ago
What is the name of the function below?<br><br> function go(){<br> alert("hello everybody");<br> }
labwork [276]

Answer:

It’s Java script I think and it makes something say hello everybody

Explanation:

6 0
3 years ago
What are the pros and cons of MP3 audio archives?
UkoKoshka [18]
Was this in reference to literal audio archives? If so, I don't see any cons beside possible copyright infringement.

If you're talking about the codecs themselves, then I can do that.

<span>Pros:

</span>- Widespread acceptance. Supported in nearly all hardware devices, and continually adopted by newer ones.

- Faster decoding. Much more so than FLAC, Vorbis, etc.

- Relaxed licensing schedule.

<span>Cons:
</span><span>
</span>- Lower quality and efficiency than most modern codecs. (To be fair, never really noticed this one).

- Sometimes the maximum bitrate isn't enough.

- Pretty much void/unusable for high definition audio (higher than <span>48kHz).</span>

 
7 0
4 years ago
Other questions:
  • Directions Use your imagination and a word processor to write a business letter with two to three paragraphs. Your business lett
    5·1 answer
  • How many megabytes of data can a factory made audio cd hold?
    13·1 answer
  • I will mark brainalist! ​
    5·1 answer
  • By using the search functionality within a twitter stream, users can filter for:
    9·1 answer
  • A potential threat to administrators’ ability to manage the correctional system is
    12·1 answer
  • A virus is a self-replicating program that produces its own code by attaching copies of it into other executable codes.
    7·1 answer
  • Monica spent a lot of time preparing for her interview, but the hiring manager is not asking any of the questions she practiced.
    9·2 answers
  • Describe advantages and disadvantages for microprocessor controlled devices in the household.
    7·1 answer
  • The most significant concerns for implementation of computer technology involve _______, security, and ethics. accuracy property
    10·1 answer
  • A user reports that he cant browse to a specific website on the internet. From his computer, you find that a ping test to the We
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!