answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
1 year ago
14

Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, wr

ite some code that results in mostTickets containing the largest value found in parkingTickets.
Computers and Technology
1 answer:
dusya [7]1 year ago
7 0

Answer:

Explanation:

mostTickets=0;

for (k=0; k< ndays; k++){

if (parkingTickets[k]>mostTickets) mostTickets=parkingTickets[k];

}

You might be interested in
Where does an MPLS label go in a PDU?
Natalija [7]

Answer: Between Layers 2 and 3

Explanation:

In between Layer 2 and Layer 3 the MPLS header is present and is known as Shim header. It is also said to be in 2.5.

6 0
1 year ago
Suppose that the following processes arrive for execution at the times indicated. Each process will run for the amount of time l
Len [333]

Answer:

a) 10.53

b) 9.53

Explanation:

a) Average Turnaround Time: ( (8-0)+(12-0.4)+(13-1.0) ) / 3 = 10.53

b) Average Turnaround Time: ( (8-0)+(13-0.4)+(9-1.0) ) / 3 = 9.53

5 0
2 years ago
Which option describes how to apply a left indent to a selected paragraph?
Leni [432]

Answer:

All the above options are correct.

Explanation:

In a Microsoft Word, to apply a left indent to a selected paragraph, a user can do any of the following:

1. Use the combination keys Ctrl+M on the keyboard to insert a left indent.

2. Use the mouse to pull the left indent marker on the ruler to create a left indent.

3. Another option is to go to the Paragraph dialogue box, place a positive value in the box labeled Left.

Hence, in this case, the correct answer is that: All the above options are correct.

8 0
1 year ago
Read 2 more answers
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
svetoff [14.1K]

Answer:

Session hijacking

Explanation:

Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

5 0
1 year ago
Marcia Wilson owns and operates Marcia’s Dry Cleaning, which is an upscale dry cleaner in a well-to-do suburban neighborhood. Ma
ryzh [129]

Answer:

Marcia Wilson owns and operates Marcia’s Dry Cleaning, which is an upscale dry cleaner in a well-to-do suburban neighborhood. Marcia makes her business stand out from the competition by providing superior customer service. She wants to keep track of each of her customers and their orders. Ultimately, she wants to notify them that their clothes are ready via e-mail. Suppose that you have designed a database for Marcia’s Dry Cleaning that has the following tables:

Assume that all relationships have been defined, as implied by the foreign keys in this table list, and that the appropriate referential integrity constraints are in place.

Create a dependency graph that shows dependencies among these tables. Explain how you need to extend this graph for views and other database constructs such as triggers and stored procedures.

Assume you want to change the name of the INVOICE table to CUST_INVOICE. Use the following steps to change the table name:

(1) Create a new table with the new name.

(2) Alter any constraints, triggers, or views that may be affected.

(3) Copy all data from the old table to the new table.

(4) Create any needed foreign key constraints

(5) Drop the old table.

Explanation:

4 0
2 years ago
Other questions:
  • The ________ program displays graphics and loading screens during the boot process.
    8·1 answer
  • When driving, your attention is __________.
    5·2 answers
  • What company built its first computer from a wooden box
    12·2 answers
  • Identify two entities and 2 of their attributes from the given scenario.
    9·1 answer
  • Insert the missing code in the following code fragment. This fragment is intended to call the Vehicle class's method. public cla
    14·1 answer
  • Which collaboration technology is becoming more and more popular within organizations because it provides a means for forming ad
    12·1 answer
  • [Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
    12·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
  • In this question, you will experimentally verify the sensitivity of using a precise Pi to the accuracy of computing area. You ne
    14·1 answer
  • Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!