Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses to the int * parameters. Prompt the user for a character. Get their response as a single character and return that from the function. In main Define three variables and call your function. Print values of your variables

Answers

Answer 1

Answer and Explanation:

In C programming language:

char fun(int*a, int*b){

printf("enter two integers: ");

scanf("%d%d",a,b);

int e;

printf("please enter a character: ");

e=getchar();

return e;

}

int main(int argc, char *argv[]) {

int d;

int f;

int g;

fun();

printf("%d%d%d", d, f, g);

}

We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.


Related Questions

Which statement is trueBlockchain is often associated with Bitcoin and the financial services industry. However, it is applicable to almost every industry. The term Multi-party Systems better describes how the blockchain system is used.

What is a benefit of a Multi-party System? about blockchain?

Answers

Blockchain is sometimes refers to original Bitcoin blockchain.

Answer :

Blockchain  is defined as the database system which maintains and also records the data in various ways  which allows the multiple organizations.

Blockchain and multiparty systems specializes in the supply chain or digital identity and also financial services.

A multi-party system prevents leadership of the single party from the controlling a single legislative chamber without any challenge.

Learn more  :

https://brainly.in/question/43683479

how can I order the prices negatively affect other producers of goods and services​

Answers

Scarcity of availability causes producers to either charge
higher prices or to produce more goods and services (like energy
production, cars, paper, etc.)

encode the original string by finding sequences in the string * where the same character repeats. replace each such sequence * by a token consisting of: the number of characters in the sequence * followed by the repeating character. * return the encoded string.

Answers

Im gonna use python3 for this example

def encode(string):

if not string:

return string

new_string = []

last_char = ""

count = 1

for char in string:

if char == last_char:

new_string.pop(len(new_string)-1)

count += 1

elif char != last_char and count > 1:

new_string.append(str(count)+last_char)

count = 1

new_string.append(char)

last_char = char

else:

last_char = char

new_string.append(char)

return "".join(new_string)

print(encode("Hello There"))

a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less than 100. End each prompt with newline Ex: For the user input 123, 395, 25, the expected output is:Enter a number (<100):Enter a number (<100):Enter a number (<100):Your number < 100 is: 25

Answers

Answer:

Explanation:

import java.util.Scanner;  

//Declare the class NumberPrompt.  

public class NumberPrompt  

{  

  public static void main(String args[])  

  {  

       /*Declare the variable of scanner class and allocate the  

       memory.*/  

       Scanner scnr = new Scanner(System.in);  

       

       //Initialize the variable userInput.  

       int userInput = 0;

       /* Your solution goes here*/

       //Start the do-while loop

       do

       {

         //Prompt the user to enter the number.

         System.out.println("Enter a number(<100)");  

         

         /*Store the number entered by the user in the

         variable userInput.*/

         userInput=scnr.nextInt();

           

       }while(userInput>=100);/*Run the do-while loop till the    

       user input is greater than 100*/  

       

       //Print the number which is less than 100.

       System.out.println("Your number <100 is "+userInput);

       return;

  }

}

Output:-

Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?

Answers

Answer:

x = 1

y = 1

Explanation:

The apply method has the axis argument which enables it to use the applied function either across the rows or columns, by passing the value 1 to the axis argument, the mean of at each index is calculated, (across the column) such that the length of the AVG column is equal to the lengtb of the original dataframe.

The drop method is used in pandas to remove row or column entry from a dataframe. To remove columns from a data table, the value 1 is passed to the axis argument of the drop method. Hence, passing 1 to the axis argument removes all 6 columns leaving only the AVG column in result_df.

The internet's data pathways rely on what kind of hardware device to route data to its destination?
servers

routers

IP addresses

ISPs

Answers

Answer:

Routers

Explanation:

Essentially a router is a device used in networking that route packets of data from one computer network to another.

Answer:

routers

Explanation:

Routers are hardware devices that route the data from place to place. Data "hops" from one router to another until it reaches its destination. ISPs and IP addresses are not hardware devices. Servers are hardware devices but do not route data.

-Edge 2022

What type of program allows a user to copy or back up selected files or an entire hard disk to another storage medium?

Answers

Answer:

backup utility

Explanation:

A test for logical access at an organization being audited would include: Group of answer choices Checking that the company has a UPS and a generator to protect against power outages Making sure there are no unmanaged third-party service level agreements Performing a walkthrough of the disaster recovery plan Testing that super user (SYSADMIN) access is limited to only appropriate personnel

Answers

Answer:

Testing that super user (SYSADMIN) access is limited to only appropriate personnel.

Explanation:

A test for logical access at an organization being audited would include testing that super user (SYSADMIN) access is limited to only appropriate personnel.

a computer cannot store the data and information for your future use true or false​

Answers

The answer would be false

Why is it useful for students to practice the MLA and APA citation methods?

Answers

Answer:

Citing or documenting the sources used in your research serves three purposes:

It gives proper credit to the authors of the words or ideas that you incorporated into your paper.

It allows those who are reading your work to locate your sources, in order to learn more about the ideas that you include in your paper.

A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.

Answers

Answer:

keylogger.

Explanation:

A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.

Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.

In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.

An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.

Which devices are considered to be central venous access devices (CVADs)? (Select all that apply.) Group of answer choices Heparin locks Peripherally inserted central catheters (PICC lines) Implanted subcutaneous ports Saline locks

Answers

Answer:

The answer is

Peripherally inserted central catheters (PICC lines)

Implanted subcutaneous ports

Explanation:

Central venous access devices are devices which are normally put in the body with the sole aim of aiding the transport of substances into the bloodstream of an individual . Such substance may include drugs, hormones etc.

Examples of such devices include Peripherally inserted central catheters (PICC lines) and Implanted subcutaneous ports

outline three difference each of a raster filled and vector file​

Answers

Answer:

Unlike raster graphics, which are comprised of colored pixels arranged to display an image, vector graphics are made up of paths, each with a mathematical formula (vector) that tells the path how it is shaped and what color it is bordered with or filled by.

Explanation:

Outlook 365 can be described as a personal information manager.
True or false

Answers

Answer:

True

Explanation:

The statement is True. The Microsoft Outlook 365 can be described as personal information manager.

What is Microsoft Outlook?

Microsoft Outlook is the software system, that allows the users to manage various personal and official information and data altogether at one place.

The Microsoft Outlook is known as personal information manager because it allows the users to managing task, providing calendar services, helps in emailing. It also manages contact and keeps the record of journal logs and many more.

Therefore, the statement regarding outlook 365 is True.

Learn more about Microsoft Outlook, here:

https://brainly.com/question/17457799

#SPJ5

How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50

Answers

Answer:

Create boxes with the following content

Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.

The check block has a diamond shape.

At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.

Connect the blocks using arrows.

Indicate the start and the end of the flow using the appropriate symbols.

The block to check if a number is a prime you could further decompose into the steps needed to do such a check.

Which of the following expressions would you use to test if a char variable named choice is equal to "y" or "Y"? a. choice.tolower = "y" || "Y" b. choice.tolower = "y" c. tolower(choice) = "y" d. tolower(choice) = "y" || "Y"

Answers

Answer:

choice.tolower == "y"

Explanation:

The tolower method is a string method in c# that converts all characters in a string to lowercase characters(if they are not already lowercase letters) except special symbols which remain the same example "#" symbol.

The tolower method does not take any arguments, therefore to use it, we simply chain it to our string variable(dot notation) and use a comparison operator "==" that evaluates to true or false based on whether the values returned on both sides are equal.

A desktop computer is a type of mobile device.

a. true
b. false

Answers

Answer:B.false
Answer B

A desktop computer is a type of mobile device: B. False.

What is a desktop computer?

A desktop computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output that's usable by an end user.

Generally, desktop computers are fitted with a power supply unit (PSU) and designed to be used with an external display screen (monitor) unlike mobile device.

In conclusion, a desktop computer is not a type of mobile device.

Learn more about desktop computer here: brainly.com/question/959479

#SPJ9

What are some 5 constraints in using multimedia in teaching​

Answers

Answer:

Explanation:

Technological resources, both hardware and software

Technological skills, for both the students and teacher

Time required to plan, design, develop, and evaluate multimedia activities

Production of multimedia is more expensive than others because it is made up of more than one medium.

Production of multimedia requires an electronic device, which may be relatively expensive.

Multimedia requires electricity to run, which adds to the cost of its use

There are constraints in using multimedia in teaching​; The Technological resources, both hardware and software Also, Technological skills, for both the students and teacher

What is a characteristic of multimedia?

A Multimedia system has four characteristics and they are use to deliver the content as well as the functionality.

The Multimedia system should be be computer controlled. The interface is interactive for their presentation and lastly the information should be in digital.

There are constraints in using multimedia in teaching​;

The Technological resources, both hardware and software

Also, Technological skills, for both the students and teacher

Since Time required to plan, design, develop, and evaluate multimedia activities

The Production of multimedia is more expensive than others because it is made up of more than one medium.

The Production of multimedia requires an electronic device, which may be relatively expensive.

The Multimedia requires electricity to run, which adds to the cost of its use.

Learn more about multimedia here;

https://brainly.com/question/9774236

#SPJ2

Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.

Answers

Answer:

c

Explanation:

please give me correct answer

please give me very short answer​

Answers

Answer:

1.A table is a range of data that is defined and named in a particular way.

2.Table tools and layout

3.In insert tab Select the table and select the number of rows and colums

4.Split cell is use to split the data of a cell.Merge cell is used to combine a row or column of cells.

5.Select the cell and click down arrow next to the border button.

which technique is the best to help you manage time better ​

Answers

Answer:

Make a schedule and select certain times to do certain things so that you could have time for more things.

Explanation:

I did the same thing now I can make time for myself.

Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named gallons with 5 elements? a. double gallons[size] = { 12.75, 14.87, 9.74, 6.99, 15.48 }; b. double gallons[size] { 12.75, 14.87, 9.74, 6.99, 15.48 }; c. double gallons[] { 12.75, 14.87, 9.74, 6.99, 15.48 }; d. all of the above e. a and b only

Answers

Answer:

all of the above

Which is not a MARKETING impact of technology?

Social
Cultural
Economic
Environmental

Answers

Answer:

the answer is environmental

Write a c program that asks the user
to enter distance in KM and Petrol Price in Rs.
Program should compute estimated budget for
the travel distance (Assume your car covers 100
KM in 8 Liters of fuel). Program should run in a
loop and ask the user “Do you want to
continue?”. If user enters ‘y’ or ‘Y’ program
should repeat otherwise terminate.

Answers

Answer:

#include <stdio.h>

int main()  

{

int x;

float y;

printf("Input total distance in km: ");

scanf("%d",&x);

printf("Input total fuel spent in liters: ");

scanf("%f", &y);

printf("Average consumption (km/lt) %.3f ",x/y);

printf("\n");

return 0;

}

various gabs in the digital divide​

Answers

Answer:

factors such as low literacy and income level Geographical restriction lack of motivation motivation of the technology lack of motivation to use technology and digital illiteracy and contribute to the digital device

Develop a c program to display the following input output interphase enter a number 5
The table of 5 is
5*1=5
5*2=10

Answers

Answer:

int main()

{

int number;

printf("Enter a number: ");

scanf_s("%d", &number, sizeof(number));

for (int i = 1; i <= 2; i++) {

 printf("%d*%d=%d\n", number, i, number * i);

}

}

Explanation:

I used the safe scanf_s() that takes a third parameter to indicate the size of the buffer. In this case it is the size of an integer.

when was first generation of computer invented? ​

Answers

Introduction: 1946-1959 is the period of first generation computer. J.P.Eckert and J.W. Mauchy invented the first successful electronic computer called ENIAC, ENIAC stands for “Electronic Numeric Integrated And Calculator”.

Write a recursive function called DrawTriangle() that outputs lines of '*' to form a right side up isosceles triangle. Function DrawTriangle() has one parameter, an integer representing the base length of the triangle. Assume the base length is always odd and less than 20. Output 9 spaces before the first '*' on the first line for correct formatting.

Answers

Answer:

Code:-  

# function to print the pattern

def draw_triangle(n, num):

     

   # base case

   if (n == 0):

       return;

   print_space(n - 1);

   print_asterisk(num - n + 1);

   print("");

 

   # recursively calling pattern()

   pattern(n - 1, num);

   

# function to print spaces

def print_space(space):

     

   # base case

   if (space == 0):

       return;

   print(" ", end = "");

 

   # recursively calling print_space()

   print_space(space - 1);

 

# function to print asterisks

def print_asterisk(asterisk):

     

   # base case

   if(asterisk == 0):

       return;

   print("* ", end = "");

 

   # recursively calling asterisk()

   print_asterisk(asterisk - 1);

   

# Driver Code

n = 19;

draw_triangle(n, n);

Output:-  

# Driver Code n = 19;| draw_triangle(n, n);

Components of micro computer with diagram

Answers

Answer:

CPU, Program memory, Data memory, Output ports,  Input ports and Clock generator.

Explanation:

There are six basic components of a microcomputer which includes CPU, Program memory, Data memory, Output ports,  Input ports and Clock generator. CPU is the central processing unit which is considered as the brain of the computer. It is the part of a computer that executes instructions. Data memory is the place where data is stored that is present in the CPU.

__________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.) The CPU, RAM c.) The application software, the hard disk d.) The operating system, the application software

Answers

Answer:

a then c

Explanation:

Without an operating system you just have a pile of metal, and the program contains code, which is just a series of commands

Answer:

d.) The operating system, the application software

Other Questions
Which is the right answerAdverbial Clauses Of Concession water can act as either a(n)__or a How will a writer's decision to use a first-person narrator impact the story?1.It will prevent the writer from setting the story in the past.2.It will push the writer to center the story on a conflict that is external and between other characters rather than one that is internal to the narrator.3.It will make it impossible for the writer to include flashbacks in the story's plot.4.It will force the writer to use descriptions of the other characters' actions and their dialogue to reveal or suggest their thoughts, feelings, and motivations. my favourite movie in French in a form of essay Which expression is equivalent to the given expression? Find the volume of the figure. If necessary, round the answer to the nearest whole number. What is the subject of the following sentence? Jay skied all day."A. skiedB. allC. The subject is impliedD. Jay Someone help please!!!!! The battery standby duration (in hours) of a new model of cell phone is known to be normally distributed. Ten pieces of such new model of cell phone supplied from the manufacturer are randomly chosen and the actual standby durations are recorded as below:48.2 47.8 45.6 47.2 49.351.2 44.2 45.4 49.2 43.6The manufacturer claimed that this new model of cell phone has the mean battery standby duration of longer than 46.5 hours. Test at 1% significance level if this claim is true. why does government have a high quality of assessment of scientific procedure? Function g is the result of these transformations on the parent sine function: -vertical stretch by a factor of 3 -horizontal shift left pi/2 -units vertical shift down 4 unitsBelow is the question from the Edmentum test :) Put the following equation of a line into slope-intercept form, simplifying allfractions.3x 9y = -72 Two friends, Al and Jo, have a combined mass of 194 kg. At the ice skating rink, they stand close together on skates, at rest and facing each other. Using their arms, they push on each other for 1 second and move off in opposite directions. Al moves off with a speed of 7.9 m/sec in one direction and Jo moves off with a speed of 6.7 m/sec in the other. You can assume friction is negligible. What is Al's mass? 110.58 What is Jo's mass? If you assume the force is constant during the 1 second they are pushing on each other, what is the magnitude of the force of Al on Jo? If you assume the force is constant during the 1 second they are pushing on each other, what is the magnitude of the force of Jo on Al? Which amendment was later repealed? A. Seventeenth Amendment B. Eighteenth Amendment C. Fifteenth Amendment D. Sixteenth Amendment Graph: y 3 = 1/2 (x + 2) Discussed prepare a report on various national identities of different regions. x+y=4 and 2x+3y=2 then find x and y essay:the best time of the year How can you say gravitational force is a field force You have been asked to help a top nutrition researcher conduct human experiments on vitamin C. As the subjects walk into the laboratory, you distribute all the vitamin C pill bottles to the girls and all the placebo pill bottles to the boys. The researcher instantly informs you that there are two errors in your research practice. What steps should you have done differently?a. given all the boys the vitamin C and the girls the placebo, and told them what they were gettingb. Distributed the bottles randomly, randomized the subjects, and told them what they were getting.c. Told the subjects which group they were in, and prevented yourself from knowing the contents of the pill bottles.d. Prevented yourself from knowing what was in the pill bottles, and distributed the bottles randomly to the subjects.