Consider the following program written in C syntax:
void swap(int a, int b) {
int temp;
temp = a;
a = b;
b = temp;
}
void main() {
int value = 2, list[5] = {1, 3, 5, 7, 9};
swap(value, list[0]);
swap(list[0], list[1]);
swap(value, list[value]);
}
. Passed by value-result

Answers

Answer 1

Answer:

5=swap 0

Explanation:

becouse it is invalid


Related Questions

What is a file and ten examples

Answers

Answer:

A file is a collection of related electronic information.

Examples;

» a report [ a dbm file ]

» a receipt [ a dbm file ]

» bill list [ a .xls file ]

» attendance sheet [ a .xls file ]

» family slideshow [ a .ppt file ]

» physics notes [ a .docx file ]

» chemistry notes [ a .doc file ]

» a query [ a .dbm file ]

» a survey sheet [ a .xls file ]

» organization work plan [ a .ppt file ]

Explanation:

[tex]{ \sf{dbm \:→database }} \\ { \sf{xls \:→ \: spreadsheet }} \\ { \sf{docx \: and \: doc→ \: word \: processor}} \\ { \sf{ppt \: → \: powerpoint}}[/tex]

Answer:

a file is for holding loose paper or important documents that are typically arranged in a particular order for easy reference

Explanation:

example PDF

DOC

AUDIO FILE FORMAT

TIFF

DOCUMENT FILE FORMAT

PSD

ZIP

Topic:

Recursion. Use recursion to display the pattern given above. No loops allowed.

See the picture for the pattern​

Answers

Answer:

const SIZE=8

function print(n, s) {

 if (n > 0) {

   process.stdout.write(s);

   print(n-1, s);

 }

}

function main(n=1) {

 if (n<=SIZE) {

   print(SIZE-n, "  ");

   print(n, "* ");

   process.stdout.write("\n");

   main(n+1);

 }

}

main();

Explanation:

Here is a solution in javascript. Note that it uses recursion multiple times to avoid loops.

When to not touch the mask? ​

Answers

Answer:

If your mask touches another part of your body that is potentially contaminated with the virus—hair, forehead, hands—and the mask is put over your mouth and nose, you are at risk for infection.

Always be sure to wash your hands before putting your mask on, and once it is in place and you are out in public, don’t keep touching or adjusting it. When you’re not wearing it, don’t leave it around your neck in case there was any type of contamination.

what is a leased line​

Answers

Explanation:

A leased line is a dedicated fixed bandwidth data connection. The word leased refers to the connection rented by the internet service provider directly to a business. A leased line needs to be symmetrical, uncontended and point to point

Answer:

Leased line refers to a dedicated communication channel that easily interconnects two or more sites. Actually, it is a service contract between a provider and a customer. This dedicated line ensures continuous data flow from one point to another for a fixed monthly rate.

Select the best answer for the question
17. Which of the following is a design theory that recognizes that many problems are similar to problems that have already been solved?
O A. C-K Theory
O BASE
OC. TRIZ
OD. General Design Theory

Answers

your answer is C my guy

Who made computer ? Which year?

Answers

Answer:

The first computer that resembled the modern machines we see today was invented by Charles Babbage between 1833 and 1871.

Answer:

Charles Babbage in 1991

Draw a system flowchart illustrating the steps performed by an operating system as it executes the instruction to back up a disk on a single-user computer system.

Answers

The flowchart's pseudo code is as follows:

The command BACKUP user issues through the user interface.UI executes the awakening File Manager instruction.File Manager resolves the address of a backup file that wakes up Device Manager.Device Manager opens the drive access path to back files in the Memory Manager I/O buffer that reads the file (or part of the data).In the I/O buffer, Memory Manager assigns memory to the processor manager.Processor Manager loads the I/O buffer memory file, and File Manager awakens.File Manager determines the document address be copied into the Processor Managers new disc.The Device Managers, Processor Manager copies memory to the I/O buffer.This device manager enables you to open a drive access path where a new disc awakens file manager will be duplicated by the I/O buffer.File Manager decides whether the file is copied completely If yes if you are jumping to point 11, you decide the next area of the file that will be backed up and Device Manager is returning to point 4.File Manager decides if this is the last backup item, if not, it wakes up Manager of Processor Activates Processor Manager for sending interface File N is backed up for a client can jump back to point 3 if affirmative. The Processor Manager activates the user interface to send the user message 'All files have been backed up'.

Learn more:

brainly.com/question/17373574

brainly.com/question/13152070

George has to present the goals of information management to his team member. What is a goal of information management? The goal of information management is to identify information requirements for various levels.

Answers

Answer:

The purpose of information management is to: design, develop, manage, and use information with insight and innovation. support decision making and create value for individuals, organizations, communities, and societies.

Explanation:

Benedetta was cyber bullied by her classmates about her looks. WHAT computer ethics was violated?

Answers

Answer:

Digital Rights Foundation’s Cyber Harassment Helpline is Pakistan’s first dedicated, toll-free Helpline for victims of online harassment and violence.  The Helpline will provide a free, safe and confidential service. The Helpline aims to provide legal advice, digital security support, psychological counselling and a referral system to victims of online harassment. The Helpline will provide a judgment-free, private and gender-sensitive environment for all its callers.

Explanation:

If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connect to: ________

a. The local loopback interface
b. The local router on the network
c. The internet
d. A private server located on the local network

Answers

B is the answer i think

Click on three software applications that you can use to create a resume?

Answers

The three software applications that are applied for creating the resume are the word, writer, and the pages.

The information related to the resume is as follows:

It is a formal document made by the applicant for applying to the job. It should be along with the cover letter where the applicant shows interest in the particular job. Also, three types of software applications should be used for developing the resume i.e. word, writer, and the pages.

Therefore we can conclude that the three software applications that are applied for creating the resume are the word, writer, and the pages.

Learn more about the resume here: brainly.com/question/22931067

UDP stands for


user-defined protocol

user-defined packets

user data packets

user datagram protoco

Answers

Answer:

user datagram protocol

Explanation:      User datagram protocol (UDP) operates on top of the Internet Protocol (IP) to transmit datagrams over a network.

Which requires large computer memory?

Answers

Answer:

Imaging , Graphics and voice..... requires large computer memory.

Explanation:

Identify the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory.
a. Programmed I/O.
b. Direct Memory Access (DMA).
c. Polling.
d. CPU interrupt.

Answers

Answer:

B. - Direct Memory Access (DMA)

Explanation:

...

Direct Memory Access (DMA) is the technique to free up the CPU by allowing device controllers to independently transfer data between the device and main memory. Thus, option B is correct.

What is Direct Memory Access?

Direct memory access is a computer system feature that allows some hardware subsystems to access main system memory without relying on the central processor unit.

Direct memory access (DMA) is the method of transmitting data without using the CPU. It is frequently used to transport data to and from input/output devices. To manage the transfer, a second DMA controller is necessary.

DMA is a mechanism that allows an input/output (I/O) device to transmit or receive data directly to or from main memory, bypassing the CPU to speed up memory operations. A chip known as a DMA controller manages the process (DMAC).

Therefore, option B is correct.

Learn more about the Direct Memory Access, refer to:

https://brainly.com/question/7218477

#SPJ5

what are the functions of super computer?

Answers

Answer:

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modeling .

Explanation:

Hope it helps you

Answer:

Supercomputers play an important role in the field of computational science, and are used for a wide range of computationally intensive tasks in various fields, including quantum mechanics, weather forecasting, climate research, oil and gas exploration, molecular modelling, etc.

Which of the following tasks should be accomplished while preparing to write the body of an email?


Take a picture with of text messages with a camera and file it away


Back-up text messages from your phone to an email account


Send a copy of the text message to another phone


Write a copy of all the text messages you would like to save

Answers

Answer:

Write a copy of all the text messages you would like to save

The task that should be accomplished while preparing to write the body of an email is:

D. Write a copy of all the text messages you would like to save.

Activities involved while preparing to write body of an email

Preparing to write the body of an email involves organizing and gathering the necessary information to include in the email.

In this context, writing a copy of all the text messages that you would like to save is the most relevant task to accomplish before composing the email. This task ensures that you have the content you want to reference or include in the email readily available and helps you structure the email effectively.

The other tasks listed are not directly related to the email writing process and can be done separately at other times for different purposes.

Learn more about writing email at

https://brainly.com/question/24688558

#SPJ2

Explain all the generation of a computer,​

Answers

Answer:

Generation in computer terminology is a change in technology a computer is/was being used. Initially, the generation term was used to distinguish between varying hardware technologies. Nowadays, generation includes both hardware and software, which together make up an entire computer system.

Explanation:

hope its help

thank you

_________ are the special effects that you see when one slide changes to another in slide show view​

Answers

Answer:

Transition effects

Explanation:

Transition effects are the special effects you see when one slide changes to another in slide show view.

Which of the following is the most general description of what computers do?
A) They record information
B) They solve problems
C) They do math
D) They convert data

Answers

Answer:

d

Explanation:

u convert it to help understand :)

The most general description of what computers do is solving problems. Hence option B is true.

Ask about the most general description of what computers do.

Now we know that;

While computers indeed record information, perform mathematical calculations, and convert data, their primary purpose is to solve a wide range of problems by processing and manipulating data.

Computers are versatile machines that can handle various tasks, from complex computations to data analysis, communication, entertainment, and much more.

So, option B) "They solve problems" would be the most fitting choice.

To learn more about computers visit:

https://brainly.com/question/30256882

#SPJ3

Write a research about the 5 major of computer applications

Answers

Answer:

At the Indian National Congress Karachi session in 1931, Congress passed resolution dissociating itself and disapproving the policy of political violence in any form. The resolution was drafted by Mahatma Gandhi which admired the bravery and sacrifice of the 3 Martyrs- Bhagat Singh, Sukhdev, and Rajguru.

Explanation:

how to enter date in a Date/Time field?​

Answers

Answer:

Right-click the document tab for the new table and click Design View. In the Field Name column, select the first blank row, and then type a name for the field. Select the adjacent cell in the Data Type column, and then select Date/Time or Date/Time Extended from the list. Save your changes.

Explanation:

give 5 examples for software ​

Answers

Answer:

Adobe Photoshop.

Picasa.

VLC Media Player.

Windows Media Player.

Windows Movie Maker

What is the value of total returned by the call secret(3) ? int secret int num) { int total= 10; switch(num) { case 1: case 2: total=5. break case 3. total= 10: case 4: total=total+3: case 8: total=total+6. break default: total=total+ 4. break} return total; }​

Answers

Answer:

19

Explanation:

Without break; statements, the switch "falls through" to the next case. So the code is directed to case 3, which sets total to 10. Then another 3 gets added and another 6, because cases 4 and 8 are also executed. That brings the total to 19.

So, always use a compile rule or code checker that checks your code for missing breaks, because it is hardly ever what you want on purpose.

When it comes to different ways of storing data on the device in a cross-platform manner, what is convenient about both native iOS and Android platforms?

a. they both provide secure file i/o
b. they both provide key-value, file i/o and sqlite data storage
c. the both provide the exact same system calls, since both platforms rely on ARM processors
d. they both provide the exact same APIs, regardless of language used

Answers

A - both provide secure file i/o

help me to solve this​

Answers

Answer:

Hello!

Mouse-points and selects gui objects

Printer-it produces hard copy output

Alu- performs mathematical calculations

Rom-the instructions stored in it cannot be changed by the user

pendrive- can be considered as a small external hard disk

P.S. please follow me and also mark me as the brainliest ;)

Answer:

the answer is :

1-4

2-5

3-1

4-3

5-2

Original IPv6 Address
Oe56:1102:0e75:8d23:3528:7e0d:419b:bdce
Compress
I

Answers

e56:11c2:e75:8d23:3528:7e0d:419b:bdce

explain the working system of a computer with an example ​

Answers

Answer:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

Hoped it helps you.

Answer:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

Explanation:

A computer system works by combining input, storage space, processing, and output. For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

Need help coding this it uses input and I need to use the words good and morning

Answers

Answer:

x = input ("Enter a word: ")

y = input ("Enter a word: ")

print ( x, " ", y)

Explanation:

This is the simplest way to write it using Python.

what is web browser give answerwh
at is web browser

Answers

Answer:

A software application used to access information on the World Wide Web is called a Web Browser.

Explanation:

When a user requests some information, the web browser fetches the data from a web server and then displays the webpage on the user's screen.

What method is known as a class's constructor, because it is run automatically when a user instantiates the class

Answers

      A constructor is a special method of a class or structure in object-oriented programming that initializes a newly created object of that type. ... Instead of performing a task by executing code, the constructor initializes the object, and it cannot be static, final, abstract, and synchronized.

Other Questions
1.We cancelled the match 3 minutes after it started due to the heavy rain. A.called off. B. carried on. C. got off 2.He removed his coat and hang it on before coming into the room. A. put on B. put out C. took off 3.Sally looks like her mother, doesnt she? A. looks atB. takes afterC. looks after 4.His book will be published next summer. A. come inB. come outC. go out 5.He resigned from his job after getting involved in the argument with the boss. A. gave upB. gave backC. went out 6.Thats a good idea but I need time to meditate about it. A.run overB. think overC. get over 7.The World War I began in 1914. A.broke downB. broke intoC. broke out 8.We need to discover how the information came out to the public. A.try onB. find outC. work out 9.You can search the meaning of these words in the dictionary instead of asking me. A.look atB. look onC. look up 10.A good friend will always support you. A.stand forB. stand byC. turn down The Dust Bowl represented a disaster in terms of economics, environment, and health. explain Question 1 of 10Imagine you are trying to convince your parents that changing the high schoolstart time from 7:10 am to 8:30 am, would make their lives easier. Whichappeal would most likely move this audience to support your cause?A. Studies show that teenagers' bodies have a biological drive to stayawake fairly late at night, so early start times lead to a constantlyovertired student population,B. I know how much it frustrates you when I sleep through my alarmand have to ask you to drive me to school. I know I would be ableto get up on time if I were able to set my alarm a little later,c. You probably don't remember how hard it is for young people toget up early, but I am a teenager, and I'm telling you, it's practicallyimpossible.OD. I consulted the records in the office, and they show that 75 percentof the students at our school arrived late to at least one class inthe last semester.PREVIOUS find the sum of first 50 terms in the sequence 10n-15. Line RS bisects segment PQ at R. If RQ = x + 9 and RP = 2x, find PQ. ANYONE TELL ME THE NAME OF A MODERATORRR what is the zero turn for the arithmetic sequence 128,96,64,32 PLEASE HELP, I UNDERSTAND BUT DONT UNDERSTAND did the colonies relationship with each other change for the better or for the worst after the french and indian war HELPPP PLEASE Find the size of each missing angle. (image attached) 4 - 2(x-4)/ 3= 3(2x+5)/2linear equation in one variableno spamms Is the expression 24 equal to the expression 8x? Explain your answer Which equation represents a population of 490 animals that increases at an annual rate of 20% ? Read the sentences.Marcus cautiously climbed to the top of the ladder. He could feel the ladder move slightly. He knew he had to mind each step.Which word is the best replacement for the underlined word?carefullyslowlyquicklysecretly A 70-year-old female has been admitted to the hospital. The client has had nausea and vomiting for the past three days. Upon admission the client is slightly confused and weak. Her vital signs are: 99 F (37.2 C), respirations 20 breaths/minute, pulse 102 beats/minute, BP 96/66 mm Hg, and her pain level is an "8"on a scale of 0-10. Breath sounds are clear bilaterally upon auscultation. Pulse oximetry is 95% on room air. Bowel sounds are absent in the right and left lower quadrants and in the left upper quadrant. Abdomen is hard and distended. When questioned as to her last bowel movement, the client responds, "I have not moved my bowels in over one week." Mucous membranes dry; skin turgor poor. 11. What would be a priority nursing diagnosis for this client? List one short-term goal. List three interventions for your priority nursing diagnosis. Midpoints & endpoints What is significant or revealing about bradfords description of the land and the people they see upon arrival? How do you prepare sukuti or slice from fruit andvegetables in your home? Mention the common process. 5 During New Moon, when does the Moon set? so did you all know about the thing that happen on instgram?