answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
2 years ago
9

9.10: Reverse ArrayWrite a function that accepts an int array and the array ’s size as arguments . The function should create a

copy of the array , except that the element values should be reversed in the copy. The function should return a pointer to the new array . Demonstrate the function by using it in a main program that reads an integer N (that is not more than 50) from standard input and then reads N integers from a file named data into an array . The program then passes the array to the your reverse array function, and prints the values of the new reversed array on standard output , one value per line. You may assume that the file data has at least N values .Prompts And Output Labels. There are no prompts for the integer and no labels for the reversed array that is printed out.Input Validation. If the integer read in from standard input exceeds 50 or is less than 0 the program terminates silently.The Language is C++
Computers and Technology
1 answer:
AleksandrR [38]2 years ago
8 0

Answer:

#include <iostream>

using namespace std;

int * reverse(int a[],int n)//function to reverse the array.

{

   int i;

   for(i=0;i<n/2;i++)

   {

       int temp=a[i];

       a[i]=a[n-i-1];

       a[n-i-1]=temp;

   }

   return a;//return pointer to the array.

}

int main() {

   int array[50],* arr,N;//declaring three variables.

   cin>>N;//taking input of size..

   if(N>50||N<0)//if size greater than 50 or less than 0 then terminating the program..

   return 0;

   for(int i=0;i<N;i++)

   {

       cin>>array[i];//prompting array elements..

   }

   arr=reverse(array,N);//function call.

   for(int i=0;i<N;i++)

   cout<<arr[i]<<endl;//printing reversed array..

   cout<<endl;

return 0;

}

Output:-

5

4 5 6 7 8

8

7

6

5

4

Explanation:

I have created a function reverse which reverses the array and returns pointer to an array.I have also considered edge cases where the function terminates if the value of the N(size) is greater than 50 or less than 0.

You might be interested in
Which of the following are true statements about digital certificates in Web browsers?I. Digital certificates are used to verify
vladimir2022 [97]

Answer:

I only

Explanation:

Digital certificate are virtual encrypted keys or password used by individuals or organization  as a means of establishing secure connections between servers and websites so as to  be able to authenticate that only the legitimate people are having access to the information.

6 0
2 years ago
Write a function named "list_concat" that takes a list of strings as a parameter and returns the concatenation of all the values
Marina CMI [18]

Answer:

Following are the program in python language:

def list_concat(ls): #define function

if(len(ls) == 0): #set if condition

return ""

res = ""

for x in ls: #set for loop

res += x + " "

return res[:len(res)-1] #removing the extra spaces from list

ls = ['limit','break','ready'] #initialize the value in list

print(list_concat(ls)) #call the function

Output:

limit break ready

Explanation:

Here we declared a function "list_concat()" in which we pass an argument "ls" then check if condition that check the length of list .We also Iterating  the loop in that function  res[:len(res)-1] statement removes the extra space from the list and finally print the list

7 0
2 years ago
Determining the Services Running on a Network Alexander Rocco Corporation has multiple OSs running in its many branch offices. B
Sladkaya [172]

Answer: provided in the explanation section

Explanation:

 Network’s vulnerabilities:

           Vulnerability is a weak spot in your network that might be exploited by a security threat. Risks are the potential consequences and impacts of unaddressed vulnerabilities. In other words, failing to do Windows Updates on your Web server is vulnerability.

           Regularly scheduled network vulnerability scanning can help an organization identify weaknesses in their network security before the bad guys can mount an attack. The goal of running a vulnerability scanner or conducting an external vulnerability assessments is to identify devices on your network that are open to known vulnerabilities without actually compromising your systems.

           The overall objective of a Vulnerability Assessment is to scan, investigate, analyze and report on the level of risk associated with any security vulnerabilities discovered on the public, internet-facing devices and to provide your organization with appropriate mitigation strategies to address those discovered vulnerabilities.

         

Network topology issues:

Coverage Topology

           Coverage problem reflects how well an area is monitored or tracked. The coverage and connectivity problems in networks have received considerable attention in the research community in recent years

 

Geographic routing

           Geographic routing uses geographic and topological information of the network to achieve optimal routing schemes with high routing efficiency and low power consumption

Port Numbers

           Port Numbers While IP addresses determine the physical endpoints of a network connection, port numbers determine the logical endpoints of the connection. Port numbers are 16-bit integers with a useful range from 1 to 65535.

Port numbers are assigned by an organization called IANA and ports are allocated to various needs to avoid confusion.

Ports are classified into 3 main categories.

Well Known Ports (Port numbers 0 - 1023)

           In a client-server application, the server usually provides its service on a well-known port number. Well-known port numbers are a subset of the numbers which are assigned to applications. According to RFC1700 [5], well-known port numbers are managed by the Internet Assigned Numbers Authority (IANA). They used to be in the range from 1 to 255, but in 1992 the range was increased up to 1023.

Registered Ports (Port numbers1024 - 49151)

Such ports are used by programs run by users in the system.

           In addition to the well-known ports below 1024 there are more port numbers assigned to applications but are located anywhere from 1024 to 65535.

Private or Dynamic Ports (Port numbers 49152 - 65535)

           Private ports are not assigned for any specific purpose.

         

Discuss the concepts of well-known ports and give a brief description of the most commonly used ports: 20, 21, 23, 25, 53, and 110.

Commonly Used Port Numbers

The following port numbers are unofficial list of commonly used for linux/unix based servers.

         

20&21               TCP                FTP (File server protocol)

           FTP is one of the most commonly used file transfer protocols on the Internet and within private networks. An FTP server can easily be set up with little networking knowledge and provides the ability to easily relocate files from one system to another. FTP control is handled on TCP port 21 and its data transfer can use TCP port 20 as well as dynamic ports depending on the specific configuration.

23                   TCP/UDP          Telnet

           Telnet is the primary method used to manage network devices at the command level. Unlike SSH which provides a secure connection, Telnet does not, it simply provides a basic unsecured connection. Many lower level network devices support Telnet and not SSH as it required some additional processing. Caution should be used when connecting to a device using Telnet over a public network as the login credentials will be transmitted in the clear.

25                   TCP/UDP         SMTP   (for sending outgoing emails)

           SMTP is used for two primary functions, it is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system.

53         TCP/UDP        DNS Server (Domain name service for DNS request)

           The DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing. DNS is hieratical with main root servers that contain databases that list the managers of high level Top Level Domains (TLD) (such as .com). T

110             TCP                 POP3 (For receiving emails)

           POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server.

4 0
2 years ago
A(n) _____ is the highest educational degree available at a community college. master bachelor associate specialist
baherus [9]
<span>An associate's degree requires two years of academic study and is the highest degree available at a community college</span>
5 0
2 years ago
Read 2 more answers
Assume the availability of class named IMath that provides a static method, toThePowerOf which accepts two int arguments and ret
geniusboy [140]

Answer:

cubeVolume = IMath.toThePowerOf(cubeSide, 3);

Explanation:

Following is the explanation for above statement:

Left side:

cubeVolume is a variable with data-type int, it will store the integer value that is the output from right side.

Right side:

  • IMath is the class name.
  • toThePowerOf is the built-in function that takes two arguments of data type int. First is the base and second is the power(exponent) separated by comma. In place of first argument that is the base variable we will pass the variable cubeSide that has been declared and initialize.
  • Now the output will be stored in the variable cubeVolume.

i hope it will help you!

4 0
2 years ago
Other questions:
  • What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
    13·2 answers
  • A good website design combines which of the following elements? (select all that apply) powerful web server hardware components
    9·2 answers
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • When Jen is planning to upgrade to a monitor with a better resolution, what should she be looking for in the new monitor? machin
    11·1 answer
  • Write a program that calculates an adult's fat-burning heart rate, which is 70% of 220 minus the person's age. Complete fat_burn
    10·1 answer
  • [Assembly Language]Extended Subtraction Procedure.Create a procedure named Extended_Sub --(Receives: ESI and EDI point to the tw
    12·1 answer
  • Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
    7·1 answer
  • In this question, you will experimentally verify the sensitivity of using a precise Pi to the accuracy of computing area. You ne
    14·1 answer
  • What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier
    14·1 answer
  • Create an application named SalesTransactionDemo that declares several SalesTransaction objects and displays their values and th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!