1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PolarNik [594]
3 years ago
11

Write a function that accepts two pointers; one to the first element and one to the last element of an integer array. The functi

on returns how many numbers are negative in the array. Use only pointer notation.
Computers and Technology
1 answer:
algol133 years ago
6 0

Answer:

The code to this question can be defined as follows:

int count(int *first, int *last)//defining a method count that accepts two integer pointer    

{

   int c=0;//defining integer variable c

   while (first <= last)//defining a while loop that counts first to last value  

   {

       if (*first < 0)//use if block to check negative value

           c++;//increment variable value

       first++;//increment first parameter value

   }

   return c;//return c value

}

Explanation:

In this code, a method "count" is declared that accepts two pointer variable "first and last" as the parameter, inside the method an integer variable "c", and a while loop is declared that counts values, and inside this an if block is used that counts the negative value and increment its value, and also increments the first parameter value, and return c value.      

You might be interested in
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that comp
dexar [7]

Answer:

c.

Explanation:

Based on the information provided within the question it can be said that the best option in this scenario would be to implement an endpoint management server appliance. This is a software or dedicated appliance that is used in order to discover, manage, and control any and all computer devices that are trying to access the corporate network. This allows you to remove individuals as well as administrative rights from those trying to connect or that are already connected.

5 0
4 years ago
Another name for divergent boundaries that occur under the ocean is
Sphinxa [80]
I believe it's seafloor spreading.
4 0
3 years ago
Read 2 more answers
Which action should you take when sending a large attachment?
zlopas [31]
Cancel out other tasks, let the internet focus upon the one attachment.
7 0
3 years ago
Distinguish the critical factors that affect the network performance in wireless Mesh Network?
ivann1987 [24]

Answer:

<u>Physical Object and Radio Frequency Interference</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

There are two main factors that affect a networks performance when talking about <u><em>Wireless Mesh Network</em></u>. The two factors are Physical Object and Radio Frequency Interference.

<u>Physical Objects</u> can cause interference in mesh networks. Common Objects such as trees and houses are common causes of interference on wireless mesh networks. The best connection is gained with a clear sight from one node to another. Specific objects such as <u><em>aluminum</em></u> made objects can cause complete signal severance.

<u>Radio Frequency Interference</u> is the second main factor when dealing with mesh networks. If there are many signals on the same frequency, Information or packets can get lost in the process causing really bad connection.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Other questions:
  • A process-based DO/S must synchronize actions across the network. When a process reaches a point at which it needs service from
    6·1 answer
  • Which of the following allows you to view and access important information about your document all in one location?
    11·2 answers
  • ________ to a base class may be assigned the address of a derived class object.
    8·2 answers
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
    7·1 answer
  • Which of the following is an object-oriented prototype-based language? Java Pike REBOL MATLAB
    9·1 answer
  • Write two methods: encrypt and decrypt. encrypt should #take as input a string, and return an encrypted version #of it according
    6·1 answer
  • True or false mobile devices need to work within limited screen space
    6·2 answers
  • What is the purpose of exploring data?
    6·2 answers
  • SummaryIn this lab, you complete a partially prewritten Java program that uses an array.The program prompts the user to interact
    12·1 answer
  • The process of specifying that certain rows be displayed in the results of a query is known as selection. ______________________
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!