Answer:
The answer is "a1 and a2 is an array of pointers".
Explanation:
In this question, A collection of pointers refers to an array of elements where each pointer array element points to a data array element. In the above-given statement, the two-pointer type array "a1 and a2" is declared that holds the same size "8" elements in the array, and each element points towards the array's first element of the array, therefore, both a1 and a2 are pointer arrays.
The thesis statement is typically located in the last sentence of the first paragraph of a research paper.
Answer:
The code is given in C++ below
Explanation:
#include <iostream>
using namespace std;
int main()
{
float fv,pv,r,k,n,pmt,totalmoneyinvested;
pv=1000.00;
r=6/100;
k=12; //The value of k should be 12 for monthly installments
n=45;
pmt=250;
totalmoneyinvested=pv+(pmt*12*45); //The total money you invested
fv=pv*(1+r/k)*n*k+pmt*((1+r/k)*n*k-1)*(1+r/k)*r/k;
cout<<"Initial Investment:"<<" $"<<pv;
cout<<"\nRate Of Return:6%";
cout<<"\nLength of Time:"<<n<<"year";
cout<<"\nMonthly Payment:"<<" $"<<pmt;
cout<<"\nFinal Amount:"<<" $"<<fv;
cout<<"\nThe Money You Invested Is $"<<totalmoneyinvested<<" And The Final Amount Is $"<<fv;
return 0;
}
Answer:
- Information services and support
- Programming and software development
- Network systems administration
Explanation:
The company has finished designing a software program, but users aren’t sure how to use it. <u>interactive media</u>
Several people in the human resources department need new software installed. <u>information services and support</u>
An employee has an idea for a software program that can save the company time, but doesn’t know how to write it. <u> programming and software development</u>
A new branch of the company is opening soon, and the computers there need to be connected to the Internet. <u>network systems administration</u>
<u>OAmalOHopeO</u>
Answer: Switch
Explanation: ARP spoofing is a illegal harmful activity in a disguised manner by a person who tries to send the ARP (Address resolution protocol)request.The disguised ARP request is sent to steal the confidential data by the overloading of the switch because of the numerous amount of the ARP request. This attack is done in the local area network .Therefore, the correct option is switch.