1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Makovka662 [10]
3 years ago
13

Identify the possible error in each line. • For each line assume that the lines above it are part of the same code and have be

en fixed by the time you get to the line you are currently examining. . Yes there are some lines with No Errors - NONE is not a red herring. a) int intA = 10; NONE b) int& iptrA = *intA; SYNTAX int *arrA = (int) malloc("iptrA); SEMANTIC for(int i = 0; i < intA; d) i++) NONE e) arrA[ I ]=i; NONE f) for(int i = 1; i < intA; i++) [Select] { cout >>"index ::" g) >> >> "="; Select] 4 cout << *(arrA + i) h) << endl; [Select] } while((floatA % i) intA) != 0) Select] { j) if(arrA[ (int)floatA] % 2 == 0); [Select] cout << "EVEN!" << endl; floatA = floatA + 1; }
Computers and Technology
1 answer:
masya89 [10]3 years ago
6 0
Twenty letters long okay
You might be interested in
To add a picture file to a PowerPoint slide, a usor should first go to the
Murrr4er [49]

How to embed images in Powerpoint?

Click on the Pictures button to open the file browser. Now, browse to where your images are stored and click on them in the file browser. Choose Insert > Pictures on PowerPoint's ribbon, then browse to and choose the images you want to insert. Click on Insert to add them to your current slide

6 0
3 years ago
when web services are offered outside the firewall, traffic is prevented from reaching the internal networks via the implementat
Tju [1.3M]

An isolated networking space or sub-network that is isolated from the rest of the organization's connected footprint using logical or physical blocks to enable access to untrusted connections in a safe environment is referred to as a demilitarized zone (DMZ).

Demilitarized zones are secluded network areas that provide as a secure link between proprietary and non-proprietary networks within an organization's perimeter. It stops unauthorized traffic from entering the internal local area network of a business. A demilitarized zone (DMZ) is a region where warring parties have agreed to put their differences aside in order to create peace. An example of a DMZ is the little sliver of territory that divides North and South Korea on the Korean Peninsula.

Learn more about demilitarized here-

brainly.com/question/7933837

#SPJ4

3 0
1 year ago
The ultimate purpose of the Building an economic model is to?
Montano1993 [528]
The correct answer is C 
4 0
3 years ago
Read 2 more answers
Whats an effective way to sort linked lists in cpp.
irina [24]

Answer:

Using Merge Sort.

Explanation:

Merge Sort is preferred for sorting the linked list because the the data stored in linked list is not in serial memory address which makes the quick sort algorithm very slow and other sorting algorithms impossible.

Merge Sort is a divide and conquer algorithm.

In this algorithms we divide the linked list into sub parts and sort the sub parts of the linked list and then we merge them in sorted order. It is a very effective approach for linked list sorting.

The time complexity of merge sort is O(NLogN).

6 0
3 years ago
https://.Mia is taught to go to sleep when the light is turned off. However, for many months Mia no longer falls asleep when the
kotykmax [81]

Answer:

Spontaneous recovery is the correct answer.

Explanation:

7 0
4 years ago
Other questions:
  • Web design people please help!
    7·1 answer
  • Which of these expressions is used to check whether num is equal to value?
    12·1 answer
  • What is grid computing? It is distributed computing where autonomous computers perform independent tasks. It is interconnected c
    12·1 answer
  • A ___________ lists all possible packet switches and gives a next hop for each.
    12·1 answer
  • So lets see what you know...Write me a short code and include a detailed explanation of the language used and what the out come
    7·1 answer
  • A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device
    12·1 answer
  • Portrait and Landscape are
    13·1 answer
  • How wireless communication might affect the development and implementations of internet of things?​
    7·2 answers
  • Explain how information in an access log could be used to identify the true identity of an impostor who has acquired unauthorize
    13·1 answer
  • A _______ attack is where the input includes code that is then executed by the attacked system.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!