can you answer this question?

Can You Answer This Question?

Answers

Answer 1

Answer:

To do this you'll need to use malloc to assign memory to the pointers used.  You'll also need to use free to unassign that memory at the end of the program using the free.  Both of these are in stdlib.h.

#include <stdlib.h>

#include <stdio.h>

#define SIZE_X 3

#define SIZE_Y 4

int main(void){

       int **matrix, i, j;

       // allocate the memory

       matrix = (int**)malloc(SIZE_X * sizeof(int*));

       for(i = 0; i < SIZE_X; i++){

               matrix[i] = (int *)malloc(SIZE_Y * sizeof(int));

       }

       // assign the values

       for(i = 0; i < SIZE_X; i++){

               for(j = 0; j < SIZE_Y; j++){

                       matrix[i][j] = SIZE_Y * i + j + 1;

               }

       }

       // print it out

       for(i = 0; i < SIZE_X; i++){

               for(j = 0; j < SIZE_X; j++){

                       printf("%d, %d:  %d\n", i, j, matrix[i][j]);

               }

       }

       // free the memory

       for(i = 0; i < SIZE_X; i++){

               free(matrix[i]);

       }

       free(matrix);

       return 0;

}


Related Questions

A Process of receiving selecting
organizing interpreting checking and
reacting to sensory stimuli or data
so as to form a meaningful and
coherent picture of the world is
Select one:
a. Attitude
b. Perception
c. Communication
d. Thinking

= Perception​

Answers

Answer:

I think it’s B based on the answer choices

Explanation:

Write a class called TextProcessor that implements the methods listed below. Your implementation may use the charAt() and length() methods from the String class You must not use any other String methods, and you must not use any of the methods in the Character class. You may not use any integer literal values except for 0 and 1.

Answers

Ieisiwizudhrhejwjjsjrjrjje

If an ISP assigned you a /28 IPv6 address block, how many computers could be as- signed an address from the block?

Answers

Answer:

I think 14 hosts (computer)

Completing an algorithm means stating the ____ of an algorithm.



(Fill in the blank pls)

WARNING! pls don't do it if you don't want to do it, Don't put an answer that doesn't have anything to do with the question If you do I'll report you full stop!

The reward for answering and correctly :

I will give you the brainiest answer, Mark 5 star, send thanks, put a nice comment and don't forget the points as well!!! ( remember only if it's right!)

THANKS SO MUCH TO ALL!!!​

Answers

Answer:

procedures for calculation

Write the command and explain about each formula in MS Excel


1. SUM

2. AVERAGE

3. MAx

4. MIN

5. COUNT

Answers

Answer:

Copy the same formula to other cells instead of re-typing it

Simply copy the formula to adjacent cells by dragging the fill handle (a small square at the lower right-hand corner of the cell). To copy the formula to the whole column, position the mouse pointer to the fill handle and double-click the plus sign.

Explanation:

hope its help

What is the software of Apple

Answers

IOS
I hope it’s correct :)

Write a program that has a user guess a secret number between 1 and 10. Store the secret number in a variable called secretNumber and allow the user to continually input numbers until they correctly guess what secretNumber is. Complete the method guessMyNumber that uses a while loop to ask the user for their guess and compares it againist secretNumber. For example, if secretNumber was 6, an example run of the program may look like this:_______.

Answers

Answer:

Explanation:

The following code is written in Python. It is a function called guessMyNumber and like requested creates a random number and saves it to secretNumber. Then it continuously asks the user for their guess and compares it to the secret number. If the guess is correct it exits the loop otherwise it will continue to ask for a new guess.

import random

def guessMyNumber():

   secretNumber = random.randint(1, 10)

   print(secretNumber)

   while True:

       guess = input("Enter your guess: ")

       guess = int(guess)

       if (guess == secretNumber):

           print("Congratulations you guessed correctly")

Which function in Excel tells how many numeric entries are ther​

Answers

Answer:The answer is given below:

Explanation:

Count function is used to get the number of entries in Excel.

There is a specific formula for it to count the entries.

The formula is A1:A20: =COUNT(A1:A20.

It is also used to find the data in the following cells.

The values et return to the cell argument.

There can be individual items or in a cluster.

First, we select the blank cell and then use the formula.

Which results are expected in a personality test but not a skills assessment?

Answers

Answer:

openness, conscientiousness, extraversion

Explanation:

A personality test is defined as a test that is used to assess the human personality. It is designed as the techniques to measure characteristics patterns of the traits that various people shows at different situations or environments.

A skill assessment test is used to test the abilities and the skill sets of people to perform a particular tasks given to them. It is measuring the knowledge and skills of a person.

The personality test are carried out to test how human behave and what traits they show in certain conditions. Thus openness, extra version and conscientiousness are some of the traits that people usually shows in a personality test. Thus they are the results that are expected by an individual of a personality test.

Tyrell is required to find current information on the effects of global warming. Which website could he potentially cite as a credible source? Select four options.

a blog by an unknown person that accuses certain companies of contributing to pollution
a nonprofit website that provides information on how to clean up the environment
a recent newspaper article on global warming from a reputable news organization
a government website providing information on national efforts to investigate global warming
a magazine article about climate change in a respected scientific journal

Answers

Answer:

2345

Explanation:

Answer:

✔ a nonprofit website that provides information on how to clean up the environment

✔ a recent newspaper article on global warming from a reputable news organization

✔ a government website providing information on national efforts to investigate global warming

✔ a magazine article about climate change in a respected scientific journal

Explanation:

simplified version: 2345

6. Pattern Displays

Use for loops to construct a program that displays a triangle of Xs on the screen. The

triangle should look like this

X XXXXX

XX XXXX

XXX XXX

XXXX XX

XXXXX X​

Answers

Answer:

public static void displayPattern()

  {

 

      for (int x = 1; x <= 5; x++)

      {

       for (int i = 0; i <= 6; i++)

       {

           if (x == i)

           {

             System.out.print(" ");

           } else {

             System.out.print("X");

           }

       }

       System.out.println("");

      }

     

  }

Don't delete my answer Brainly moderators, you know as well as I do that you'll never be stack overflow so take what you can get.

Cathy connected a keyboard, mouse, and printer to her Computer through a Bluetooth connection. What type of network has she created?

Answers

Answer:

Cathy has created a Personal Area Network

Explanation:

Let us define a personal area network.

A personal area network is created by connecting multiple devices of a user and it is panned over a very short distance. Mainly used technology is Bluetooth.

Cathy has used Bluetooth to connect keyboard, mouse and printer to her computer, she has formed a Personal Area Network.

Answer: pan

Explanation: got it right edmentum

What is the next line? >>> tupleB = (5, 7, 5, 10, 2, 7) >>> tupleB.count(7) 1 0 5 2

Answers

Answer:

The right answer is option 4: 2

Explanation:

Lists are used in Python to store elements of same or different data types.

Different functions are used in Python on List. One of them is count.

Count is used to count how many times a specific value occurs in a list.

The syntax for count is:

listname.count(value)

In the given code,

The output will be 2

Hence,

The right answer is option 4: 2

Answer:

The answer is 2!!!!

Explanation:

Good luck!

Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new videos for $3.00 a night, and oldies for $2.00 a night.Write a program that the clerks at Five Star Retro Video can use to calculate the total charge for a customer’s video rentals.

Answers

Answer:

The total cost is $13.0

Explanation:

Five Star Retro Video rents VHS tapes and DVDs to the same connoisseurs who like to buy LP record albums. The store rents new videos for $3.00 a night, and oldies for $2.00 a night.

Write a program that the clerks at Five Star Retro Video can use to calculate the total charge for a customer's video rentals.

The program should prompt the user for the number of each type of video and output the total cost.

Exercise 1.3.5: Expressing conditional statements in English using logic. info About Define the following propositions: c: I will return to college. j: I will get a job. Translate the following English sentences into logical expressions using the definitions above: (a) Not getting a job is a sufficient condition for me to return to college. (b) If I return to college, then I won't get a job. (c) I am not getting a job, but I am still not returning to college. (d) I will return to college only if I won't get a job. (e) There's no way I am returning to college. (f) I will get a job and return to college..

Answers

hope this helps!!!. i worked hat

CSc 2720 - Data Structures: Assignment 1 [100 points] How to Submit: Turn the .java file in Folder Assignment 1 in iCollege no later than 11:00 p.m. ET on 01/27/2021 Notes: 1. Do not use any library for matrix multiplication. 2. Always use comments to explain your program. 3. No copying allowed. If it is found that students copy from each other, all of these programs will get 0. 4. You must use matrix.java as the program name; otherwise, you will lose 10%. Requirements: You are to write a program name matrix.java that makes the dot products of 2 arrays. 1. Your program should prompt the user for the dimensions of the two squares matrices, making sure that the user input is equal to 50. 2. If the above is not met, prompt the user for a new value. 3. Now generate random integer numbers (ranging from 0 to 50) to fill both matrices. 4. Display these two matrices on the screen. 5. Multiply the two matrices and display the result on the screen. 6. Insert a clock to see how long it would take to multiply these two matrices and display the time (with a message to this effect). 7. Prompt the user asking if they want to repeat the program. A simple example of program output (here matrix dimension is 4, your should be 50):

Answers

Hehehwkwjhdhebfhshshwjbrbr

Are chairs and tables considered technology?
A) true
B) false

Answers

Answer:true

Explanation:

By definition technology is the skills methods and processes used to achieve goals

Chairs and tables are considered technology. The given statement is True.

A comfortable ergonomic office chair lessens the chronic back, hip, and leg pain brought on by prolonged sitting. Employees are able to operate more effectively and productively as a result. Another advantage is a decrease in medical costs associated with poor posture brought on by uncomfortable workplace chairs.

How does technology make your life comfortable?

They can perform their tasks more easily and independently thanks to technology. They feel more empowered, certain, and positive as a result. Many people can benefit greatly from technology. It goes beyond simply being "cool." The most recent technologies can also simplify life.

Among other major technologies, 3D modeling, virtual reality, augmented reality, and touch commerce has an impact on the design and production of furniture. Before actual furniture is built on the ground, it is possible to virtually create it using 3D or three-dimensional modeling.

Thus, Technology includes things like chairs and tables. The assertion is accurate.

Learn more about technology here:

https://brainly.com/question/9171028

#SPJ2

Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network compromises.

a. True
b. False

Answers

Answer: True

Explanation:

The Intrusion Detection System (IDS) is used for the detection of malicious activities and thus is done by monitoring if the network communications and also the examination of systems logs.

When something looks suspicious of fishy, the Intrusion Detection System scans such thing out. When violations of policy occurs, the Intrusion Detection System is at alert to notice.

Therefore, the answer to the statement in the question is true.

Write a program that takes a first name as the input, and outputs a welcome message to that name.
Ex: If the input is Pat the output is:
Hello Pat and welcome to cs Online
Input Welcome message
1 user_name = input 2 3
Type your code here

Answers

Answer:

The program in Python is as follows:

user_name = input("Name: ")

print("Hello "+user_name+" and welcome to cs Online")

Explanation:

The program is written in Python, and it uses basic input and output function to execute the instruction in the question.

First: Prompt the user for username

This is done in the following line

user_name = input("Input your name: ")

Next, the print function is used to output the welcome message

print("Hello "+user_name+" and welcome to cs Online")

The program that takes first name as the input, and outputs a welcome message to that name is represented below:

user_input = str(input("please type your first name: "))

print(f" Hello {user_input} !! Welcome to CS online ")

The code is written in python.

The variable user_input is used to store the user's input. It ask the user for his/her first name and store it.

Then we print the welcome statement using the f string.

F-string are use to combine strings and variables.

learn more on python program; https://brainly.com/question/14644566?referrer=searchResults

The divBySum method is intended to return the sum of all the elements in the int array parameter arr that are divisible by the int parameter num. Consider the following examples, in which the array arrcontains {4, 1, 3, 6, 2, 9}.
The call divBySum(arr, 3) will return 18, which is the sum of 3, 6, and 9, since those are the only integers in arr that are divisible by 3.
The call divBySum(arr, 5) will return 0, since none of the integers in arr are divisible by 5.
Complete the divBySum method using an enhanced for loop. Assume that arr is properly declared and initialized. The method must use an enhanced for loop to earn full credit.
/** Returns the sum of all integers in arr that are divisible by num
* Precondition: num > 0
*/
public static int divBySum(int[] arr, int num)

Answers

Answer:

The complete method is as follows:

public static int divBySum(int[] arr, int num){        

     int sum = 0;

     for(int i:arr){

         if(i%num == 0)

         sum+=i;

     }

     return sum;

   }

Explanation:

As instructed, the program assumes that arr has been declared and initialized. So, this solution only completes the divBySum method (the main method is not included)

This line defines the method

public static int divBySum(int[] arr, int num){        

This line declares and initializes sum to 0

     int sum = 0;

This uses for each to iterate through the array elements

     for(int i:arr){

This checks if an array element is divisible by num (the second parameter)

         if(i%num == 0)

If yes, sum is updated

         sum+=i;

     }

This returns the calculated sum

     return sum;

   }

In which type of network will a problem with one computer crash the network?


mesh

ring

star

bus

Answers

Answer:

Probably a mesh since they daisy chain off one another. If one in the middle crashes, there is a disconnect of all the ones following it.

Answer:

bus + ring

Explanation:

edge 2021 :)

Differentiate between Calling and Called program?

Answers

Answer:

The program name in CALL statement called as CALLED program/Sub program. A program can contain as many CALLs required and no restriction on it. In other words, CALLING program can CALL as many subprograms required. CALLED may not have the CALL statement to call another program.

Explanation:

Identify the correct characteristics of Python lists. Check all that apply. Python lists are enclosed in curly braces { }. Python lists contain items separated by commas. Python lists are versatile Python data types. Python lists may use single quotes, double quotes, or no quotes.

Answers

Answer:

Python lists contain items separated by commas.

Python lists are versatile Python data types.

Python lists may uses single quotes, double quotes, or no quotes.

Explanation:

Python Lists are enclosed in regular brackets [ ], not curly brackets { }, so this is not a correct characteristic.

Answer:

a c d

Explanation:

System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web. True or False
O True
O False

Answers

Answer:

False

Explanation:

System software is the collection of programs that controls and manage the operation of a computer.

System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web is a false statement.

What is the software about?

A system software is made up of software development tools but software that gives room for users to create text documents, play games, listen to music, or others are known to be application software.

Therefore, System software is software that allows users to do things like create text documents, play games, listen to music or web browsers to surf the web is a false statement.

Learn more about System software from

https://brainly.com/question/24321656

#SPJ6

How does calculate() work?

Answers

By answering questions math problems lol

Answer:

calculate works by determining the amount of something

Explanation:

Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to print two random integers between (and including) 0 and 9. End with a newline. Ex:
5.
7.
Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, after calling srand() once, do not call srand() again. (Notes)
1 #include
2 #include //
3 Enables use of rand ()
4 int main(void) ( int seedval;
6.
7. scanf ("%d", &seedval);
8.
9.
10 srand(int seedval);
11 printf("%d\n", srand());
12 printf("%d\n", srand());
13
14 return e;
15 }

Answers

Answer:

#include<stdio.h>

#include<stdlib.h>

int main(void){

int seedval;

scanf ("%d", &seedval);

srand(seedval);

printf("%d\n", rand()%10);

printf("%d\n", rand()%10);

 return 0;

}

Explanation:

The given code is poorly formatted. So, I picked what is usable from the code to write the following lines of code:

#include<stdio.h>

#include<stdlib.h>

int main(void){

This line declares seedval as integer

int seedval;

This line gets user input for seedval

scanf ("%d", &seedval);

This line calls the srand function to generate random numbers

srand(seedval);

This prints a random number between 0 and 9

printf("%d\n", rand()%10);

This also prints a random number between 0 and 9

printf("%d\n", rand()%10);

 return 0;

}

Conside following prototype of a function
int minArray(int [], int );
Which of the option is correct way of function CALL assuming following arraydeclaration
int x[5] = {7,4,6,2,3};*
a) minArray(x,5);
b) minArray(x[],10);
c) minArray(x[5],5);
d) minArray(5,x);

Answers

Answer:

The answer is "Option a"

Explanation:

Following are the code to this question:

#include <stdio.h>//header file

int minArray(int x[], int n)//defining method minArray that accepts two parameters

{

   for(int i=0;i<n;i++)//defining loop for print value

   {

    printf("%d\n",x[i]);//printf array value

   }

}

int main()//defining main method

{

int x[] ={7,4,6,2,3};//defining array that hold values

int n=5;//defining integer variable

minArray(x,5);//calling method minArray

return 0;

}

In this code, a method "minArray" is defined, that accepts two parameters array and an integer variable in its parameter, and in the next step, the for loop is declared, that uses the print method to prints its value.

In the next step, the main method is declared, which declared an array and holds its values and defines an integer variables, and calls the method "minArray".

Hydraulic pressure is the same throughout the inside of a set of brake lines. What determines the amount of resulting mechanical
force is the size of the piston in the wheel cylinder or caliper. For example: 100 psi of fluid pressure acting against a caliper piston
with 4 square inches of surface area will result in 400 lbs of clamping force.
A fluid line with 200 psi in it acting against a piston with 3 square inches of area would result in 600 lbs of force.
A fluid line with 50 psi acting on a larger piston with 12 square inches of surface area would result in 600 lbs of force, and so on...
How much fluid pressure would it take to lift a 6000 lb truck on a lift with a 60 quare inch piston (such as on an automotive lift)?
Give your answer and try to justify your answer using an equation or formula.. Pressure x surface area equals mechanical force,
or... force divided by surface area equals fluid pressure

Answers

Answer: 1000 square ponds of force hope you know the answer

Explanation: i guessed

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?

a. Asset management
b. Baselines
c. Network maps
d. Change management

Answers

Answer:

d. Change management

Explanation:

Change management can be defined as a strategic process which typically involves implementing changes (modifications) to an existing process or elements on a computer system.

In this scenario, an administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Thus, what best describes these actions is change management.

As a network administrator, you would be required to perform changes to your network and network devices in order to get an optimum level of performance.

Choose the type of collection created with each assignment statement. collectionA = {5:2} collectionB = (5,2) collectionC = [5, 2]

Answers

Answer:

CollectionA is Dictionary

CollectionB is List

CollectionC is Tuple

Explanation:

List is recognized by the square brackets

Tuple by the parentheses

Dictionary by the curly brackets

Answer:

Dictionary collectionA

Tuple collectionB

List collectionC

Explanation:

A dictionary uses curly brackets. A tuple uses parentheses. A list uses square brackets.

Other Questions
Bob borrows $3000 at 6% interest, compunded anually. If he makes no payments, how much will he owe seven years from now? a$3049.42 b$3140.36 c$4510.89 d$4260.00 PLEASE HELP IM TIMED p.s its ok if you only answer the ones you know and skip the ones you dont know.1.What is habeas corpus?A. the principle that a persons property cannot be taken by the government without legislative approvalB. a written list of freedoms that a government promises to protectC. the principle that a person cannot be imprisoned without being charged for a specific crimeD. the idea that no monarch or other government leader can levy taxes without legislative approval2.Which were the upper class of colonial society?A. small planters, independent farmers, and artisansB. indentured servantsC. the gentryD. free African Americans3. In colonial times, how did a young man often learn a trade?A. by becoming an apprenticeB. by going to schoolC. by becoming an indentured servantD. by buying his own business4.Which is true of womens roles in colonial towns?A. Women usually supervised children and slaves household chores.B. Women participated in public life, holding office and voting throughout the colonies.C. Womens duties were strictly limited to running a household, making clothing, and preparing meals.D. Women sometimes kept shop or an inn, or worked in various trades.5.Why were jobs in public office held only by the gentry?A. Candidates had to pay to hold office.B. Many official jobs were voluntary positions.C. Office holders had to pass educational tests.D. Campaigning for elections was very expensive. 4. Which of the following have mass? Select all that apply.O A neon-filled tube.A diamond.Water in a glassThe helium in a balloon. If the boy travelled 2 meters to the right and 4 meters to the left what is the total distance that he travelled?4 m-4 m6 m2 m HELP ME PLZZ IM SO CONFUSED How are CD's recorded?Using digital technologyusing analog technology True or False: Foods that are high in fiber can help remove unhealthy cholesterol and support a healthy digestive track. Romeo will roll a 6 sided number cube numbered 1-6 what is the probablility of rolling an odd number on the first roll and then number 4 on the second roll. a 1/12. b 1/6. c 1/4 d 1/3 A bagcontain 20 red, 15 yellow and 25 blue balls.Uncle K takes one ball from the bag. Find the probabilitythat the ball is:RedYellowBlueRed or yellow With the help of information calculate the number neutrons present in the non-metallic elements of the periodic table. During class, students were asked to talk to their neighbor to determine whether3/9 represents a repeating decimal or a terminating decimal. Diego told hisneighbor that 3/9 represents a terminating decimal. Is Diego correct? Explainyour reasoning in a full sentence.Your answer I NEED HALP ASAP HALP Heres a short story I wrote. Tell me what you think :) (The main characters are kangaroos and since they live in Australia I had to type as if their Australian. Im American though so the accent is probably horrible lol)Willow And Kipper- A trip to the Juice BarGood day, mate! How about a little dash to the juice bar, eh? Willow the kangaroo asks his friend.Sounds jolly good, mate! Lets hop on over! Kipper the kangaroo replies.Righty-O then! Willow says.They hopped on over to Juice Smack, their typical hang-out spot. They were greeted by JoJo the koala.Ello mate! Whatll it be for you lads today? JoJo asks.Hmm, Ill take a Fresh Kiwi Bubbler Smoothie and a Traditional Davidsons Plum Scone. How about you, Kipper?Ill have the same as her.Righty then. There are benches next to the loo so have a seat over there.Thanks, mate. Willow says.Willow and Kipper hop over to the benches and take a seat next to each other. On there right sits their grandmas friend Melanie the Kangaroo. She has her daughter's little one, Frankie the Kangaroo in her pouch. Frankie waves at us as she bounces her tennis ball against the back wall. Hello Kip. Hello Willy.Good day, Frankie! Are you ordering a smoothie? Kipper asks her.Yeah! Grammy said I could have whatever I liked today as a special treat! Ooh sounds fun! Whatd you choose? Willow asks.A green salad with fresh tomatoes and a Strawberry Punch Smoothie.Just then JoJo called Melanie and Frankies order so they went and picked it up after telling them a quick goodbye. Willow and Kipper waited a few more minutes before JoJo called up their order. Crikey, this is delicious! Kipper and Willow say on their way home.They walk inside the house to find something red leaking from under the couch. They lift up the cushions to see where the leak is coming from. Then they see it a body. The body of Melanie. They scream and run outside. But in their bedroom waiting for them. I followed them to the juice bar, watched them talk to Melanie and Frankie, then followed them home and broke in. Here I am now, holding the bloody knife I used to kill their friends.StaringGrinningWaiting... Polar dissolvesA. nonpolar B. polarC. all moleculesD. none of the above What is the result of subtracting the second equation from the first?x3y=68xy=6 i will give you brainliest if you tell me 2 anime suggestions How can scientists map hidden fault pls keep it short What was the main subject of debate among delegates to the Convention?Plz help I have a test tomorrow Hi I need help please Find the volume of the prism.