When a variable is stored in memory, it is associated with an address. To obtain the address of a variable, the & operator can be used. For example, &a gets the memory address of variable a. Let's try some examples. Write a C program addressOfScalar.c by inserting the code below in the main function

Answers

Answer 1

Solution :

#include<stdio.h>

int main()

{

char charvar='\0';

printf("address of charvar = %p\n",(void*)(&charvar));

printf("address of charvar -1 = %p\n",(void*)(&charvar-1));

printf("address of charvar +1 = %p\n",(void*)(&charvar+1));

int intvar=1;

printf("address of intvar = %p\n",(void*)(&intvar));

printf("address of intvar -1 = %p\n",(void*)(&intvar-1));

printf("address of intvar +1 = %p\n",(void*)(&intvar+1));

}


Related Questions

Which error produces incorrect results but does not prevent the program from running? a. syntax b. logic c. grammatical d. human e. None of the above

Answers

Answer:

Logic Error

Explanation:

I'll answer the question with the following code segment.

Program to print the smallest of two integers (written in Python)

num1 = int(input("Num 1: "))

num2 = int(input("Num 2: "))

if num1 < num2:

  print(num2)

else:

  print(num1)

The above program contains logic error and instead will display the largest of the two integers

The correct logic is

if num1 < num2:

  print(num1)

else:

  print(num2)

However, the program will run successfully without errors

Such errors are called logic errors

What is a piece of information sent to a function

Answers

Answer:

the information sent to a function is the 'input'.

or maybe not hehe

Write a program that asks for the names of three runners and the time, in minutes, it took each of them to finish a race. The program should display the names of the runners in the order that they finished.

Answers

Answer:

Written in Python

names = []

times = []

for i in range(0,3):

     nname = input("Name "+str(i+1)+": ")

     names.append(nname)

     time = input("Time "+str(i+1)+": ")

     times.append(time)

if times[2]>=times[1] and times[2]>=times[0]:

     print(names[2]+" "+times[2])

     if times[1]>=times[0]:

           print(names[1]+" "+times[1])

           print(names[0]+" "+times[0])

   else:

           print(names[0]+" "+times[0])

           print(names[1]+" "+times[1])

elif times[1]>=times[2] and times[1]>=times[0]:

     print(names[1]+" "+times[1])

     if times[2]>times[0]:

           print(names[2]+" "+times[2])

           print(names[0]+" "+times[0])

     else:

           print(names[0]+" "+times[0])

           print(names[2]+" "+times[2])

else:

     print(names[0]+" "+times[0])

     if times[2]>times[0]:

           print(names[2]+" "+times[2])

           print(names[1]+" "+times[1])

     else:

           print(names[1]+" "+times[1])

           print(names[2]+" "+times[2])

Explanation:

I've added the full source code as an attachment where I used comments to explain difficult lines

Write a program that computes and display the n! for any n in the range1...100​

Answers

Answer:

const BigNumber = require('bignumber.js');

var f = new BigNumber("1");

for (let i=1; i <= 100; i++) {

 f = f.times(i);

 console.log(`${i}! = ${f.toFixed()}`);

}

Explanation:

Above is a solution in javascript. You will need a bignumber library to display the numbers in full precision.

Tasha works as an information technologist for a company that has offices in New York, London, and Paris. She is based out of the New York office and uses the web to contact the London and Paris office. Her boss typically wants her to interact with customers and to run training seminars to teach employees new software and processes. Which career pathway would have this type of employee?

Answers

Answer:

D. Interactive Media

Explanation:

i just took the test right now

The career pathway which would have this type of employee is an interactive media.

What is media?

Media is a terminology that is used to describe an institution that is established and saddled with the responsibility of serving as a source for credible, factual and reliable news information to its audience within a geographical location, either through an online or print medium.

In this context, an interactive media is a form of media that avail all media personnels an ability to easily and effectively interact with their customers or audience.

Read more on media here: https://brainly.com/question/16606168

A hammer has an input distance of 9 cm and an output distance is 3 cm what is the ideal mechanical advantage

Answers

Answer:

1/3

Explanation:

Define a Python function named matches that has two parameters. Both parameters will be lists of ints. Both lists will have the same length. Your function should use the accumulator pattern to return a newly created list. For each index, check if the lists' entries at that index are equivalent. If the entries are equivalent, append the literal True to your accumulator. Otherwise, append the literal False to your accumulator.

Answers

Answer:

The function in Python is as follows:

def match(f1,f2):

    f3 = []

    for i in range(0,len(f1)):

         if f1[i] == f2[i]:

              f3.append("True")

         else:

         f3.append("False")

    print(f3)

Explanation:

This line defines the function

def match(f1,f2):

This line creates an empty list

    f3 = []

This line is a loop that iterates through the lists f1 and f2

    for i in range(0,len(f1)):

The following if statement checks if corresponding elements of both lists are the same

         if f1[i] == f2[i]:

              f3.append("True")

If otherwise, this is executed

         else:

         f3.append("False")

This prints the newly generated list

    print(f3)

Is 583 a string or a number?

Answers

It is a number that is the answer

Answer:

a string

answer


Describe how to manage the workspace by putting each feature under the action it helps carry out

Answers

Answer:

Viewing Documents one at a time:Windows+tab keys,

Windows taskbar

Viewing documents at same time:

Snap,Arrange all

Explanation:

 The workspace can be managed by putting control of the surroundings it's far important that you examine all of the factors and items found in your area.

What is the workplace for?

Workspaces had been round in Ubuntu properly earlier than the transfer to Unity. They essentially offer you a manner to organization home windows associated with comparable duties together, in addition to get "additional" screenspace.

The subsequent step is to outline a logical and optimizing feature for the factors with a view to continuing to be on your surroundings, defining that each of them may be capable of carrying out an easy and applicable project for his or her paintings.

Read more about the workspace :

https://brainly.com/question/26463698

#SPJ2

what is the use of buffer?​

Answers

Answer:

pH buffer or hydrogen ion buffer) is an aqueous solution consisting of a mixture of a weak acid and its conjugate base, or vice versa. ... Buffer solutions are used as a means of keeping pH at a nearly constant value in a wide variety of chemical applications.

Explanation:

there is your answer i got this one correct

hope it is helpful

Answer:

Limits the pH of a solution

Explanation:

A P  E X

Shortest Remaining Time First is the best preemptive scheduling algorithm that can be implemented in an Operating System.

a. True
b. False

Answers

Answer:

a

Explanation:

Yes, true.

Shortest Remaining Time First, also popularly referred to by the acronym SRTF, is a type of scheduling algorithm, used in operating systems. Other times it's not called by its name nor its acronym, it is called the preemptive version of SJF scheduling algorithm. The SJF scheduling algorithm is another type of scheduling algorithm.

The Shortest Remaining Time First has been touted by many to be faster than the SJF

The answer to the question which asks if the Shortest Remaining Time First is the best preemptive scheduling algorithm that can be implemented in an Operating System is:

True

What is Shortest Remaining Time First?

This refers to the type of scheduling algorithm which is used to schedule tasks that would be executed in the processing unit in an Operating System based on the shortest time taken to execute the task.

With this in mind, we can see that this is the best preemptive scheduling algorithm that can be implemented in an Operating System because it makes task execution faster.

Read more about scheduling algorithm here:
https://brainly.com/question/15191620

there are no more than 60 people in a certain class to participate in the final .the exam subjects are programming, English, and mathematics .the following functions are realized by two dimensional array programming.calculate the average score of each student

Answers

Answer:

If there are many people in the class and if most of these people have never done such an intensive proof-based class, then I'd say this is not so surprising  that the class average would be 56%-34%

Explanation:

hopes this help this question threw me off a lot

Documents files should be saved as a _____ file

Answers

Answer:

PDF

Explanation:

Is main memory fast or slow?

Answers

Answer:

Slower

Explanation:

Which of the following documents has a template available in the online templates for your use?
letters
resumés
reports
all of the above

Answers

Answer:

The answer is all of the above.

Explanation:

3.4 Code Practice: Question 1

Answers

Answer:

color = input("What color? ")

if (color == "yellow"):

   print("Correct!")

else:

   print("Nope")

Explanation:

My code is dependent on if the color is supposed to be case sensitive

PV = 11,000 AC = 6000 CV = 4,000. What is SV? What does this calculation tell you?

Answers

Answer:

I don't see an SV in the examples.. I suspect these are the name plate numbers off of a transformer... but.. more context would really help

Explanation:

To create a public key signature, you would use the ______ key.

Answers

Answer:

To create a public key signature, you would use the _private_ key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

For everyday files that users will use regularly on a user's own Word-compatible computer, the best file format to save as is: o PDF. DOCX ORTE. OTXT.​

Answers

Answer:

DOCX? I think

Explanation:

Which of the following tasks can you perform using a word processor?
insert a bulleted list in a document
check a document for spelling errors
edit a video for inclusion in a document
create an outline of sections to be included in a document
set a password to restrict access to a document

Answers

Create a outline of sections to be included in a document

The following task can you perform using a word processor is creating an outline of sections to be included in a document. The correct option is c.

What is a word processor?

A word processor is a computer program or device that provides for input, editing, formatting, and output of text, often with additional features.

Simply put, the probability is the likelihood that something will occur. When we don't know how an event will turn out, we can discuss the likelihood or likelihood of several outcomes.

Statistics is the study of events that follow a probability distribution. In uniform probability distributions, the chances of each potential result occurring or not occurring are equal.

Therefore, the correct option is c. create an outline of sections to be included in a document.

To learn more about word processors, refer to the link:

https://brainly.com/question/14103516

#SPJ5

Choose the word to make the sentence true. The ____ function is used to display the program's output.

O input
O output
O display

Answers

The output function is used to display the program's output.

Explanation:

As far as I know this must be the answer. As tge output devices such as Monitor and Speaker displays the output processed.

The display function is used to display the program's output. The correct option is C.

What is display function?

Display Function Usage displays a list of function identifiers. It can also be used to display detailed usage information about a specific function, such as a list of user profiles with the function's specific usage information.

The displayed values include the prefix, measuring unit, and required decimal places.

Push buttons can be used to select functions such as summation, minimum and maximum value output, and tare. A variety of user inputs are available.

A display is a device that displays visual information. The primary goal of any display technology is to make information sharing easier. The display function is used to display the output of the program.

Thus, the correct option is C.

For more details regarding display function, visit:

https://brainly.com/question/29216888

#SPJ5

The reading element punctuation relates to the ability to

pause or stop while reading.

emphasize important words.

read quickly yet accurately.

understand word definitions.

Answers

Answer:

A

Explanation:

Punctations are a pause or halt in sentences. the first one is the answer so do not mind the explanation.

semi colons, colons, periods, exclamation points, and question Mark's halt the sentence

most commas act as a pause

Answer: (A) pause or stop while reading.

Explanation:

Custom function definitions:________.
A. Must be written before they are called by another part of your program
B. Must declare a name for the function
C. Must include information regarding any arguments (if any) that will be passed to the function
D. all of the above

Answers

Answer:

D. all of the above

Explanation:

A option is correct and function definition must be written before they are called by another part of your program. But in languages such as C++ you can write the prototype of the function before it is called anywhere in the program and later write the complete function implementation. I will give an example in Python:

def addition(a,b): #this is the definition of function addition

    c = a + b

    return c    

print(addition(1,3)) #this is where the function is called

B option is correct and function definition must declare a name for the function. If you see the above given function, its name is declared as addition

C option is correct and function definition must include information regarding any arguments (if any) that will be passed to the function. In the above given example the arguments are a and b. If we define the above function in C++ it becomes: int addition( int a, int b)

This gives information that the two variables a and b that are parameters of the function addition are of type int so they can hold integer values only.

Hence option D is the correct answer. All of the above options are correct.

The best method to prevent information on a disk from being discovered is to: A) use DOD overwrite protocols in wiping information from the disk. B) put the disk and the computer under water. C) melt the plastic disk contained within a hard drive container. D) smash the drive with a stout hammer

Answers

Answer:

C) Melt the plastic disk contained within a hard drive container

Explanation:

Data protection is very necessary from keep saving information from those that are not eligible to access it. It helps to avoid phishing scams, and identity theft.Alot of information are stored on the harddisk daily which can be read by disk drive, as situation can warrant prevention of third party from discovering information on it.There is hard platter used in holding magnetic medium in hard disk which make it different from flexible plastic film used in tapes.The disk drive container helps to hold as well power the disk drive.

It should be noted that The best method to prevent information on a disk from being discovered is to firstly

Melt the plastic disk contained within a hard drive container.

The state way of grading drivers is called what?

*

Answers

Oh yeah I forgot what you did you do that I mean yeah I forgot to tell you something about you lol lol I don’t want to see it anymore

This assignment requires you to write a well documented Java program to calculate the total and average of three scores, the letter grade, and output the results. Your program must do the following:
Prompt and read the users first and last name
Prompt and read three integer scores
Calculate the total and average
Determine a letter grade based on the following grading scale - 90-100 A; 80-89.99 B; 70-79.99 C; below 70 F
Use the printf method to output the full name, the three scores, the total, average, and the letter grade, properly formatted and on separate lines.
Within the program include a pledge that this program is solely your work and the IDE used to create/test/execute the program. Please submit the source code/.java file to Blackboard. Attached is a quick reference for the printf method.

Answers

Answer:

The solution is given in the explanation section

Don't forget to add the pledge before submitting it. Also, remember to state the IDE which you are familiar with, I have used the intellij IDEA

Follow through the comments for a detailed explanation of each step

Explanation:

/*This is a Java program to calculate the total and average of three scores, the letter grade, and output the results*/

// Importing the Scanner class to receive user input

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   //Make an object of the scaner class

   Scanner in = new Scanner(System.in);

   //Prompt and receive user first and last name;

   System.out.println("Please enter your first name");

   String First_name = in.next();

   System.out.println("Please enter your Last name");

   String Last_name = in.next();

   //Prompt and receive The three integer scores;

   System.out.println("Please enter score for course one");

   int courseOneScore = in.nextInt();

   System.out.println("Please enter score for course two");

   int courseTwoScore = in.nextInt();

   System.out.println("Please enter score for course three");

   int courseThreeScore = in.nextInt();

   //Calculating the total scores and average

   int totalScores = courseOneScore+courseTwoScore+courseThreeScore;

   double averageScore = totalScores/3;

   /*Use if..Else statements to Determine a letter grade based on the following grading scale - 90-100 A; 80-89.99 B; 70-79.99 C; below 70 F */

   char letterGrade;

   if(averageScore>=90){

     letterGrade = 'A';

   }

   else if(averageScore>=80 && averageScore<=89.99){

     letterGrade = 'B';

   }

     else if(averageScore>=70 && averageScore<=79.99){

     letterGrade = 'C';

   }

   else{

     letterGrade ='F';

   }

   //Printing out the required messages

   System.out.printf("Name:  %s %s\n", First_name, Last_name);

   System.out.printf("scores: %d %d %d:  \n", courseOneScore, courseTwoScore, courseThreeScore);

   System.out.printf("Total and Average Score is: %d %.2f:  \n", totalScores, averageScore);

   System.out.printf("Letter Grade: %C:  \n", letterGrade);

  // System.out.printf("Total: %-10.2f:  ", dblTotal);

 }

}

(d) Assume charArray is a character array with 20 elements stored in memory and its starting memory address is in $t5. What is the memory address for element charArray[5]?

Answers

Answer:

$t5 + 5

Explanation:

Given that ;

A character array defines as :

charArray

Number of elements in charArray = 20

Starting memory address is in $t5

The memory address for element charArray[5]

Memory address for charArray[5] will be :

Starting memory address + 5 :

$t5 + 5


ANSWER ASAP PLSSS
ALSO GIVE ME RIGHT ANSWER NOT A RANDOM ONE

———-——-————————

Question 1 (1 point)
What function would you use to find the total number of views of all the videos?
Average
ОMax
Count
Min
Sum

Answers

Answer:

ethier you can do sum and average

I believe the answer would be sum

List three hardware computer components? Describe each component, and what its function is.

Answers

Answer:

moniter: a screen and is used to see what the computer is running

webcam: the camera on the computer. can be already built in or added

power supply: an electrical device that supplies power to an electrical load

Explanation:

Answer:

Input device

output device

C.P.U

The collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out how to generate excitement about the film. Which of the five phases of filmmaking are they most likely in?

Answers

Answer:

Distribution.

Explanation:

Filmmaking can be defined as the art or process of directing and producing a movie for viewing in cinemas or television. The process of making a movie comprises of five (5) distinct phases and these are;

1. Development.

2. Pre-production.

3. Production.

4. Post-production.

5. Distribution.

Distribution refers to the last phase of filmmaking and it is the stage where the collaborative team considers a return on investment by creating advertisements in order to have a wider outreach or audience.

In this scenario, the collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out how to generate excitement about the film.

Hence, they are likely to be in the distribution phase in relation to the five phases of filmmaking.

Answer:

C: distribution

Explanation:

edg2021

Other Questions
PLEASE HELP AND ANSWER FAST!!! :( Della has $575.38 in her checking account. What is the balance after she makes a deposit of $50.00 and a withdrawal of $85.45?A. $539.93B.558.45C. 561.63D.603.73 Sound intensity, in decibels, d, can be written using a comparison factor, x, that compares sound intensity to the standard threshold of hearing. d = 10log(x) A sensor measures the sound intensity, in decibels, of an office over time. The decibel reading was consistently above 50, but never above 70. On what interval is the factor by which the office noise is related to the standard threshold of hearing? (17, 18.5) (17, 18.5] (100,000, 10,000,000] (100,000, 10,000,000) B. Explain how some words and phrases provided evidence that led you to determine the important events in the plot. annabel lee answer Which of the following statements would be most likely to minimize expected fixing costs? a. A machine should always be calibrated at the midpoint between the upper and lower spec limits. b. A machine should be calibrated closer to the upper spec limit than the lower spec limit if the cost of fixing output that is too high is greater than the cost of fixing output that is too low. c. A machine should be calibrated closer to the lower spec limit than the upper spec limit if the cost of fixing output that is too high is greater than the cost of fixing output that is too low. Define a Python function named matches that has two parameters. Both parameters will be lists of ints. Both lists will have the same length. Your function should use the accumulator pattern to return a newly created list. For each index, check if the lists' entries at that index are equivalent. If the entries are equivalent, append the literal True to your accumulator. Otherwise, append the literal False to your accumulator. A black hole forms when a very massive star collapsesSelect one:a. Falseb. True help needed please answer asap PLEASE HELP, ASAP!!! I WILL GIVE A THANKS, 5-STAR RATING, AND BRAINLIEST!!!*Also, please include the coordinates of the new line and fill the blanks**If can't do all, at least do half* A peptide has the sequence of Gly-Ser-Glu-Leu-Ala-His-Gly-Arg-Leu-Ala-PheCys-Leu. (pKR=4.25, 6.0, 8.2, 12.5. Assume pKas of amino terminus and carboxyl terminus are 9.6 and 2.3, respectively.) The PI of the peptide is close to:_______a. 7.1b. 7.8c. 5.1d. 8.2e. 10.3 TIMED UNIT TEST Hector must find the sum of 50 + 83 + 50 by using mental math. Which property allows Hector to simplify the equation to 50 + 50 + 83 and find an equivalent sum?associative propertycommutative propertydistributive propertyidentity property Differentiate between the homes of the poor and the homes of the wealthy. Rules are in the best interest of our? A runner completes a 400m race in 43.9s. What is his average speed? Which historical research source is most similar to conducting an interview with someoneNewspaper article, book review, or autobiography f(x)=1/3(4-x)^2 ................ solutionn/8+1/2 = -3 1/2 Help me please Chemical energy is a form of_______ energyA. heat B. kinetic C. potential D. electromagnetic The Native Texan culture that constructed this type of housing led which of the following way-of-life?A. farmerB. nomadic - hunterC. nomadic - gathererD. hunter-gatherer If you were in charge of regulating the air pollution of your country, what policy would you Implement to achieve the goal of clean alr?Describe how your policy would improve air quality and how your national policy differs from your international policy. SUPER EASYHow do I rewrite x + y = -3 in slope intercept form.