Answer:
Following are the solution to the given choices:
Explanation:
Given:
double currentBalance[91];//defining a double array
In point a:
The name of the array is= currentBalance.
In point b:
91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728
In point c:
Each element's data type is double.
In point d:
The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).
In point e:
To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]
Answer:
Embedded Operating System.
Explanation:
Embedded OS (also called Real Time Operating System) is designed to perform a single purpose in devices that may or may not be computers that have very little computer power and little RAM size such as washing machines, ATM, media player, automobiles, and cameras. Examples of such embedded operating system are iOS(used in Apple's mobile devices), Symbian, Palm OS and Window OS.
Since they are used in single-purpose computers, they handle and perform their tasks with so much efficiency.
<em>Hope this helps!</em>
<span>If you want to add a border you have to use 'Insert' tab to make this change. Then you have to click on</span> "Picture" that is placed in the Insert menu, and choose "Clip Art." You can use the search box at the top of the Clip Art gallery in order to find a suitable border. When you finally found it, click on it, then select the button "Insert".
Answer:
The correct answer is option (D).
Explanation:
According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.
while the other options are wrong because of the following reasons :
- A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules.
- An auditor can be defined as a program that is used to analyze the network.
- The hacker can be a person who hacks the system to gain access or gather information.
Answer:
No need to be overly-sensitive, brainly deleted that question
If no one joins then its not a problem