1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
choli [55]
4 years ago
9

Write statementsto show how finding the length of a character array char [ ] differs from finding the length of a String object

str.
Computers and Technology
1 answer:
NARA [144]4 years ago
4 0

Answer:

Length of char array: sizeof(arr)

Length of a string object: myString.length()

Explanation:

The sizeof approach is generally not recommended, since this information is lost as soon as you pass the array to a function, because then it becomes a pointer to the first element.

You might be interested in
When you are fit, you can exercise and do physical work without getting too tired. A. True B. False\
enot [183]

Answer:

A.

Explanation:

But all of us get tired

3 0
3 years ago
Read 2 more answers
Sql is an example of a ________ category programming language. 4gl 3gl 5gl 2gl
kicyunya [14]
The answer is Fourth-generation language (4GL).  <span>Sql is an example of a 4GL category programming language.  </span>SQL<span> is considered a Fourth-generation </span>language<span> (</span>4GL), whereas Java and C++ are third-generation languages<span> (3GLs). Fourth-generation </span>languages<span> are programming  </span>languages<span> that are closer to human </span>language<span> than the high-level </span>languages<span>  like Java.</span>
8 0
3 years ago
What specific database stores local user accounts on local computers, and allows users to sign in to and access resources only o
Yuki888 [10]

Answer:

The Security Account Manager

Explanation:

The Security Account Manager (SAM), This is a database file found in Windows Operating Systems.... Windows XP, Windows Vista, Windows 7, 8.1 and 10 that stores users' passwords. It can be used to authenticate local and remote users. It is  an important and vital component of how Windows stores passwords locally on the computer.

5 0
3 years ago
What would you need to have on your foley stage
LUCKY_DIMON [66]
<span>You will need many props for your Specific tracks (whatever you see in the film!). It's impossible to say what you will need until you see the picture and as time goes by you will add to your collection (if you have space!) - garbage day in my neighborhood is 'golden day' as I collect some of best props from the stuff people throw out: old bicycles, doors, sinks, wood, metal, desks, etc.</span>
4 0
3 years ago
Text line breaks and returns are controlled using which tags?
eduard
<b></b> <span>element when used to strongly emphasize portions of text within a document.
<p></p> </span><span>tag defines a paragraph.
<ol></ol> </span><span>Defines an ordered list
<a></a> </span><span> tag defines a hyperlink</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • What is the property of the Magnetic Lasso tool?
    6·2 answers
  • Need help with just #8
    12·1 answer
  • What is a computer network?
    5·1 answer
  • Is anyone really good at immerse 2 learn??
    9·1 answer
  • Write a routine to interchange the mth and nth elements of a singly-linked list. You may assume that the ranks m and n are passe
    10·1 answer
  • What does remedy mean
    7·2 answers
  • What is the first step that you have to perform before you can add a windows package to a wim file?
    9·1 answer
  • ¡Hola! He visto en muchos comentarios de Twitter "svd" cuando alguien dice "dale fav a este Tweet y siganse entre ustedes" y en
    8·1 answer
  • According to the video, what are some concerns of Webmasters? Check all that apply.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!