1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
avanturin [10]
3 years ago
8

Question 5 a. critically explain why you would consider arrays over normal data types [5 marks] b. from you explanation in “a” a

bove, write and initialize an array called BongoBar of type string and having 4 element. [5 marks] c. embed your array in “b” above in a full c++ program. [5 marks] d. critically explain what will happen if an amateur programmer called BongoBar[5] in the main function in you program in “c” above.
Computers and Technology
1 answer:
pychu [463]3 years ago
5 0

Can you explain the question better?

You might be interested in
When you were configuring Encrypting File System (EFS) in the lab, a __________ on the Documents folder in the File Explorer ind
harina [27]
I’m not 100% sure but I think it’s a padlock that represents it
3 0
3 years ago
Explain program and programming with two examples of each<br>Help​
evablogger [386]

Answer:

program (noun) is executable software that runs on a computer. ... Examples of programs include Web browsers, word processors, e-mail clients, video games, and system utilities. These programs are often called applications, which can be used synonymously with "software programs." On Windows, programs typically have an .

7 0
3 years ago
IT ethics are rules, policies, or principles that guide the behavior of IT professionals.
Vadim26 [7]

Answer: true

Explanation: true

6 0
2 years ago
Sharon is a network engineer for your firm and is investigating the WAN connection into the hot site. In the event of operations
lisabon 2012 [21]

Answer:

The correct answer to the following question will be "Peak capacity" and "Bandwidth starvation".

Explanation:

Peak capacity has been used to characterize the gradient aqueous phase separation efficiency or performance. It represents the overall conceptual number of operations or components which can be isolated consistently with something like a given set of analytical circumstances and column with

⇒ Rs =1 (Figure 1 and Equation 1)

Certain traffic competing at its policies for the available or unused bandwidth will theoretically enable classes with lower value rates to starve to bandwidth.

Due to these activities, Sharon is concerned about "Bandwidth starvation" and "Peak capacity".

8 0
3 years ago
Microsoft® Publisher does which of the following?
AVprozaik [17]

Answer:

Creates items using page layout skills

8 0
2 years ago
Read 2 more answers
Other questions:
  • Mike wants to build an amplifier. Which technology can he use?
    15·1 answer
  • Clip art, by default, is formatted as a(n) ____, which cannot be moved to a precise location on a page.
    14·1 answer
  • Match the parts of the website address with its correct explanation. http://www.usa.gov/Agencies/federal.shtml
    10·2 answers
  • The right headlight does not function on either high or low beam. Technician A says this could be caused by an open ground on th
    12·1 answer
  • High capacity circuits are limited by the least capable network link, which is typically the user connection. As such, it is imp
    11·1 answer
  • Which of the following is the best definition of being a “digital citizen”?
    6·2 answers
  • Why is the most important factor for investors always the quality of the venture's leadership team
    12·1 answer
  • Who can search the internet and select element base on important words
    13·1 answer
  • Which of the following is the BEST reason to use cash for making purchases? everfi
    15·1 answer
  • _____________are where you get down to business and enter data in a worksheet
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!