A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.

Answers

Answer 1

Answer:

tictactoe[1][1]

Explanation:

To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::

Given a 2 - dimensional 3×3 array of integers :

Creating a dummy array assigned to the variable tictactoe :

[1 2 3]

[4 5 6]

[7 8 9]

We have a 3×3 array, that is 3 rows and 3 columns.

The middle element in the middle row is located in the second row ;second colum

Row and column Indexes starts from 0

Middle element in the middle row is the value 5 and it corresponds to :

tictactoe[1][1]

We call the variable name and the we use one square box each to house the row and column position.


Related Questions

You have a website that accepts input from users for creating customer accounts. Input on the form is passed to a database server where the user account information is stored. An attacker is able to insert database commands in the input fields and have those commands execute on the server. Which type of attack has occurred

Answers

Answer:

SQL injection

Explanation:

SQL (Structured Query Language) Injection, are vulnerabilities associated security of SQL web interface through which an attacker can intrude into the backend of a database by modifying the queries a web program sends to the database to which it is connected

Examples of SQL injection include: Subverting application logic, which uses modified queries to alter the logic of an application. UNION attacks, which allow the retrieval of data from different tables within a database. Retrieving hidden data, which allows the attacker to have additional query results through modification of a SQL query.

write any five main features of fourth generation of computer?​

Answers

1) The fourth generation computers have microprocessor-based systems. It uses VLSI (Very Large Scale Integrated) circuits.
2) They are the cheapest among all the computer generation.
3) The speed, accuracy and reliability of the computers were improved in fourth generation computers.
i hope this helps you

How to execute python code in command prompt *window*?

Iam using sublime text 3 and want to execute my python code in command prompt.
This is my current build system:

{
"cmd": ["python", "$file"],
"selector": "source.python",
"file_regex": "^\\s*File \"(...*?)\", line ([0-9]*)"
}

But I want my program to open in command prompt window and show the result there. I dont want to see the result in sublime text. Please help.

Answers

Answer:

Open Command Prompt and type “python” and hit enter. You will see a python version and now you can run your program there

You are the security analyst for your organization. Clients are complaining about being unable to connect to the wireless network. After looking into the issue, you have noticed short bursts of high-intensity RF signals are interfering with your wireless network's signal. Which type of attack are you most likely experiencing

Answers

Explanation:

denial of service attacks (dos)

Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

What is Electronic jamming?

This is known to be a kind of  electronic warfare that is the use of jammers that shows interfering signals toward an enemy's system and thus it often blocks the receiver.

Therefore, Based on the above, the kind of attack the person is most likely experiencing is known as jamming.

Learn more about jamming from

https://brainly.com/question/17488276

#SPJ9

what do you mean by automation and diligence with respect to a computer??​

Answers

Answer:

Delegince computer without any motion resists

What is a single physical processor? plz help​

Answers

Answer:

A physical processor which is also referred to as a CPU, is a chip that is visible on a computer's circuit board.

Explanation:

What is the output?
>>> password = "sdf345"
>>> password isalpha()
>>>

Answers

Explanation:

the output password is isalpha()

c programming question


Given n, take the sum of the digits of n. If that value has more than one digit, continue reducing in this way until a single-digit number is produced. The input will be a non-negative integer.

Answers

Answer:

int digitSum(int n) {

int sum = 0;

while (n) {

 sum += n % 10;

 n /= 10;

}  

return sum < 10 ? sum : digitSum(sum);

}

int main()

{

int n = 12345;

printf("Digit sum of %d is %d\n", n, digitSum(n));

}

Explanation:

The recursion takes care of the repeated summing in case the sum has more than 1 digit.

What is a monitor?
i can ask everyone ​

Answers

Answer:

a screen which displays an image generated by a computer.

Explanation:

A monitor is a piece of computer hardware that displays the video and graphics information generated by a connected computer through the computer's video card. Monitors are similar to TVs but usually display information at a much higher resolution. Also unlike televisions, monitors typically sit atop a desk rather than being mounted on a wall.

please help me with this this is Computer chapter Advanced HTML of class 8th​

Answers

Answer:

ok let me try

It stands for

Hypertext Markup Language

Image result for html stands for

HTML (the Hypertext Markup Language) and CSS (Cascading Style Sheets) are two of the core technologies for building Web pages. HTML provides the structure of the page, CSS the (visual and aural) layout, for a variety of devices.

Calculates the current that feeds a washer toy having a 10 ohm resistor and a battery operated with a potential difference of 30 v

Answers

Explanation:

Using Ohm's Law and a bit of substitution, we can solve for current.

If an angry person called and demanded to speak with the executive you support, who is currently unavailable, how would you handle it?

Answers

Answer: be nice no matter how mean or rude the person is.

Explanation: because if you’re not you can get in big trouble or fired.

Answer:

remain  calm during the conversation

What impact, if any, have advances in technology had on people’s ability to communicate through media? Advances in technology have had no measurable impact on people’s ability to communicate through media. Advances in technology have made it more difficult for people to communicate through media. Advances in technology have made it easier for people to communicate through media. Advances in technology have had made it both easier and more difficult to communicate through media.

Answers

Answer:

What impact, if any, have advances in technology had on people's ability to communicate through media? Advances in technology have made it easier for people to communicate through media.

Answer:

advances in technology made it easier for ppl to communicate through media

Explanation:

because i got it right

Which of these would you use to connect a mouse to a computer?
O RAM
O ROM
O USB
O TOT

Answers

USB is the answer because that is the adapter to plug it in

What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any program designed to do harm a type of software designed to track activity online

Answers

a malware is any program designed to do harm

Explanation:

a malware (malicious software) is any software intentionally designed to cause damage to a computer,server, client or computer network.

When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class

Answers

Answer:

provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified

Explanation:

I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.

Your help desk has informed you that they received an urgent call from the vice president last night requesting his logon ID and password. You discussed about the call with the VP today and you got to know he never made that call. What type of attack is demonstrated in the given scenario

Answers

Answer:

Social Engineering Attack

Explanation:

The exploitation of individuals in order to gain confedential information is a Social Engineering Attack. These attacks typically take advanage of one's emotions or they use inpersonaltion to steal data.

read more here: https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Lmk if this helps! :)

The information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

Answers

Answer:

True.

Explanation:

A resume (curriculum vitae) can be defined as a short text-based document that a job applicant use to briefly outline his or her qualifications, abillities and accomplishments, haven completed and obtained an academic certificate. Thus, it is used to briefly outline a person's qualifications, abillities, skills set, and accomplishments, after completing and obtaining an academic certificate such as a bachelor's degree, master's degree, etc.

Generally, all job applicants are required to have a resume (curriculum vitae). This brief and concise document is always requested by human resource managers during the job application process.

Furthermore, the primary way to make a resume persuasive (to convince or inform an action in the minds of the readers - potential employers) is by customizing it to fit each company and position.

Hence, the information included in a résumé should always relate to the job objective; if it isn’t related, it shouldn’t be included.

This ultimately implies that, job applicants are expected to tailor their resume to fit or match the position that is advertised by a company's human resources department.

A transition is ________.

Answers

Answer:

the process or a period of changing from one state or condition to another.

Explanation:

"students in transition from one programme to another"

a key part of staying safe is employing good habits. drag the step number to the proper sequence triple a

Answers

Answer:

where are the step number. I can't find any

When a statement within a try block causes an exception, the remaining statements in the try block Select one: a. are executed after the statements in the catch block b. are executed before the statements in the catch block c. aren't executed

Answers

In C++, 'Try block' comprises of a group of statements in which there is a probability of an exception to take place.

C). The statements that would be left in the try block in case a particular statement leads to an exception 'can't be executed.'

In case an exception takes place, the left statements in the try block fail to function. This is the primary reason for which a catch block immediately succeeds a try block in order to deal with the exception and help close that code to allow the statements to work. Thus, option C is the correct answer.

Learn more about 'Try block' here:

brainly.com/question/14186450

4) Programming a) WAp to find the greatest number among any three numbers.​

Answers

def comp_num (num1, num2, num3):

try:

if num1 > num2 and num1 > num3:

print ( "{0} is the biggest".format(num1) )

elif num2 > num1 and num2 > num3:

print ( "{0} is the biggest".format(num2))

elif num3 > num2 and num3 > num1:

print ( "{0} is the biggest".format(num3))

except ValueError:

return "Invalid input"

num_1 = int (input (" Please enter a number: "))

num_2 = int (input (" Please enter a second number: "))

num_3 = int (input (" Please enter a third number: "))

print (comp_num (num_1, num_2, num_3))

Answer:

this is in qbasic programming

whats an MAR? lolz better not take my points #bonkers

Answers

Answer:

[tex]\huge\mathcal{\fcolorbox{aqua}{azure}{\red{✿ʏᴏᴜʀ- ᴀɴsᴡᴇʀ ♡❖}}}[/tex]

A Medication Administration Record (MAR, or eMAR for electronic versions), commonly referred to as a drug chart, is the report that serves as a legal record of the drugs administered to a patient at a facility by a health care professional. The MAR is a part of a patient's permanent record on their medical chart

▓▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓

[tex]\boxed{\pmb{\green{\sf{MAR}}}}[/tex]

medication administration record:-

 A computer-generated schedule for administering medications to a patient for a defined period of time, including dosing, timing of administration and details about the physician’s orders.

▓▓▓▓▓▓✿▓▓▓▓✿▓▓▓▓▓▓▓▓

c) Explain GIGO briefly.​

Answers

Answer:

Is is also a computer science acronym that implies bad input will result in bad output. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

IT'S FORMULA IS GIGO: GARBAGE IN GARBAGE OUT...

HOPE IT'S HELPFUL FOR U!!

AND PLZ MARK ME AS BRAINLIEST IF U LIKE THIS ANSWER!!!!

Type the correct answer in each box. Spell all words correctly.

Digital artist Frank is discussing how to enhance scanned or photographed images. Complete the following sentences while keeping in mind the topic of discussion.

You can rework or enhance scanned or photographed images using photo editing and illustration software or by using a digital____.

The device has a_____surface on which you can draw images, graphics, and animations.

Answers

Answer:

1. Tablet

2. Flat

Explanation:

The router is physically located in a server room that requires an ID card for access. You backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with the username admin and the password admin. You used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device

Answers

Answer: Use an SSH client to access the router configuration.

Change the default administrative username and password

Explanation:

Based on the information given, in order to increase the security of the device, it's vital to use an SSH client to access the router configuration. The SSH client refers to the program that helps in establishing an authenticated and secure SSH connections to the SSH servers. It's vital for operating network services securely over a network that's unsecured.

Also, the default administrative username and password should be changed to a more secure username and password which can't be easily known by a third party.

What is computer system ?​

Answers

Answer:

a system that is a computer

Answer:

Invertebrates are animals that neither possess nor develop a vertebral column, derived from the notochord. This includes all animals apart from the subphylum Vertebrata. Familiar examples of invertebrates include arthropods, mollusks, annelid, and cnidarians

Bruce frequently works with a large number of files. He is noticing that the larger the files get, the longer it takes to access them. He suspects that the problem is related to the files being spread over the disk. What utility can be used to store the files contiguously on the disk

Answers

The utility that could be stored for the files is disk defragmenter.

The following information related to the disk defragmenter is:

In the case when the program saved the file on the disk so here the file should be put onto the empty space. It considered all the parts & pieces on each and every file and the same should be stored in one place.Also, the programs should be kept in one place, and the space that is not used should be on the hard disk.

Therefore we can conclude that The utility that could be stored for the files is disk defragmenter.

Learn more about the disk here: brainly.com/question/12656426

0.3. Fill in the blanks,7marks
a. A smart____uses IoT to save electricity.
b._____are devices that can sense , store and analyse signals from the body and display the information on the gadget and an app.
c. The full form of CSS is_____.
d. The syntax of CSS is made of_____
and_____.
e._____CSS is used to beautify one particular tag.
f. Internet of Things makes use of connected devices, smartphones and_________.
g._____track the number of steps a person has walked in a day.​

Answers

Answer:

a) phone

b)

c) cascading style

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

Other Questions
Which statement most effectively conveys how culturalviewpoint affects the text?It shapes the point that Tara Charan needs a propermate.It shapes the idea that only some people are allowedto marry.It shapes the fact that Kunda needs a place to live.It shapes the notion that marriages are made basedon love. A liquid has a density of 2 g/mL, the volume is measured at 20 mL, what is the mass of the liquid? Is Statistics mathematics or science? Defend your answer. A dice is rolled twice and the result the result of each roll is added together. What is the probability that the sum is equaled to 2? Do you agree with the view that themerchant of venice is a play lacking in the unity of structure?class 9 icse I NEEDDDD HELPPPP ITS URGENTTTT!!!!!! PLZZZ HELPPP, IF NOT 100% SURE PLZ DONT ANSWERBRAINLIEST TO FIRST AND CORRECT ANSWER, THX TO SECOND AND CORRECT ANSWER Which of the following is an example of shape in Piet Mondrian's Composition with Red, Yellow, and Blue? The color red The color yellow The lines The rectangle pls help, and explain. Will give brainliest Explain the importance of economic analysis Given the following balanced reaction: 2Na(s) + F2(g) --> 2NaF(s)a) How many moles of NaF will be made from 2.6 moles of F2?b) How many moles of NaF will be made from 4.8 moles of Na? Accounts receivable arising from sales to customers amounted to $120,000 and $105,000 at the beginning and end of the year, respectively. Net income reported on the income statement for the year was $457,000. Exclusive of the effect of other adjustments, the cash flows from operating activities to be reported on the statement of cash flows is "What if speciation occurred in humans?" Your essay should give a clear and precise example of speciation.A student is asked to write an essay over the hypothetic prompt above. While brainstorming, the student came up withfour different ideas for their essay. Which idea is BEST aligned with the writing prompt and instructions? What does the phosphorylation of Cdc25 by M-Cdk do? Question 4 options: It inactivates Cdc25, which promotes activation of more M-Cdk. It activates Cdc25, allowing the cell to exit mitosis. It activates Cdc25, which inactivates M-Cdk. It inactivates Cdc25, preventing further activation of M-Cdk. It activates Cdc25, which in turn activates more M-Cdk. My names Lisa. I often get up at 6. Then I do some morning exercises. I usually ride my bicycle to school. Sometimes, I take the bus. I have my breakfast in the canteen. My class starts at 7:30. Suggested questions:1.What time do you often get up?/ go to bed?..........................................................................................................................................2.Do you often do morning excercise? Why (not)?.........................................................................................................................................3.Where do you live? How far is your house from school? Development of the society is a universal process. Justify the statement. Part AWhen the following liquids are poured into the same container, they separate as shown in the image. Based on the datain the table below, what caused the order of the layers?rubbing alcoholvegetable oilwatercorn syrupMassLiquidcorn syrupwaterVolume Used95 cm90 cm85 cm105 cm?130.15890.00 877.35881.908Density1.37 g/cm1 g/cm0.91 g/cm0.78 g/cmvegetable oilrubbing alcoholIBXFont SizesA- A -E 3 Consider the triangle XYZ . Find the angle Z given that ZY=30 , ZX=15 , and YX=21 On her camping trip, Penelope was in charge of collecting firewood. The firewood she found had a mass of 120 g and a volume of 480 cm3. What is the density of the firewood? Explain the steps you took to solve this problem. Read this line from "O Captain! My Captain!". "The ship is anchor'd safe and sound, its voyage closed and done;" What does this line refer to? A. The ship is Lincoln, who is home from a trip. B. The ship is the army, who continues to fight the war. C. The ship is the army, which is safe now that the war is over. D. The ship that has arrived is anchored to the dock.