1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
12

In an array-based implementation of a dictionary, if you represent the entries as an array of objects that encapsulate each sear

ch key and corresponding value, how many pointers will you use per array entry?
a. 3
b. 4
c. 2
d. 1
Computers and Technology
1 answer:
xxMikexx [17]3 years ago
3 0

Answer:

The answer is "Option C".

Explanation:

Dictionary is a set of unsorted data values, that is used to save data like a map and which contains a key: value pair in comparison to many other types of data, which only carry a specific number as just an element.

If we use Dictionary as an array so, it uses a two-pointer variable, one for hold key, and the second is used to hold its value.

You might be interested in
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
Which of the following assessments uses computer-adaptive technology to provide questions? SAT, ACT, ASVAB, or ACCUPLACER?
never [62]
ACCUPLACER, I hope this helps :)
7 0
3 years ago
Read 2 more answers
Beth’s multimedia business specializes in sound integration and editing. A New project requires video editing and the creation o
ANEK [815]

Answer:

A. Adobe illustrator

Explanation:

4 0
3 years ago
9.4 Code Practice:Question 1
Ymorist [56]

Answer:

// Program is written in C++

// Comments are used for explanatory purpose

// Program starts here

#include<iostream>

using namespace std;

int main()

{

// Declare array

/* There are 18 characters between f and w. So, the array is declared as thus;*/

char letters [18];

// Initialise array index to 0

int i = 0;

// Get input

for(char alphs = 'f'; alphs<='w'; alphs++)

{

letters[i] = alphs;

// Increment array elements

i++;

}

// Print Array

cout<<"['";

for(int j = 0; j <18; j++)

{

if(j<17){

cout<<letters[j]<<"', '";

}

else

{

cout<<letters[j]<<"']";

}

}

return 0;

}

Explanation:

The above code declares a char array named letters of length 18. This is so because there are 18 characters from f to w (both inclusive). This is done using the following: char letters [18];

Index of array starts from 0; so, the next line initializes the array letters to 0 and prepares it for input.

The first for-loop statement is used to input characters to letter array. This done by iterating from 'f' to 'w' using variable alphs.

Outside the for loop; the statement cout<<"['"; prints ['

The next for loop prints f','g','h' ........ 'w']

Bring this two prints together, it gives the desired output

['f','g','h' ........ 'w']

4 0
3 years ago
Cheryl has several concepts for mobile apps for smartphones. A friend suggests that she develop her apps for an open-source oper
Flura [38]

Answer:

Personally, I would focus on an open-source operating system because that is a simpler OS to code with. It is also free on some websites to code.

I hope this helped!

7 0
4 years ago
Other questions:
  • What is MARC? Discuss structure of MARC
    8·1 answer
  • Write a function that takes an array of integers and its size as parameters and prints the two largest values in the array. In t
    5·1 answer
  • What type of lights are necessary for silhouettes?
    12·2 answers
  • An example of a(n) ____ reconnaissance attack is a user who sends SQL injections to a system in hopes of generating some type of
    7·2 answers
  • This is the term for the manual process of editing strips of the film before digital editing was created. The term is still used
    9·1 answer
  • Which tools allows you to see the edition, version and memory use by windows 10?
    5·1 answer
  • Define artificial intelligence?​
    15·2 answers
  • Which of the following images illustrates safe driving?
    8·2 answers
  • Which of the following is true about named ranges?
    6·1 answer
  • What is boot sector virus​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!