Suppose the value of RENT_BY_FLOOR_AND_BDRMS[0][1] is 390. The value within the first pair of brackets following the array name refers to the ____.

A. column
B. row
C. address
D. data type


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) The first element of the 4 × 3 × 5 matrix named mat1 is referenced in C++ as mat1[0, 0, 0]. 2) In memory, C++ stores the first element of the second column of a two-dimensional array immediately after the last element of the first column. 3) When declaring a multidimensional array in C++, the dimensions may be integer constants, integer parameters, or any other integer expressions. 4) This code fragment will display an M ? N matrix a column at a time. ``` for (c = 0; c < N; ++c) { for (r = 0; r < M; ++r) cout << setw( 5 ) << matrix[r][c]; cout << endl; } ``` 5) If mat is a 4 ? 5 matrix, and p = 2 and q = 3, then this is a valid reference to an element of mat: mat[q][p * q - 4]

Computer Science & Information Technology

Which of the following is NOT a true statement about contrast?

A) High contrast can be created by using two different colors. B) High contrast increases the readability of a slide. C) Many contrasting colors brings additional focus to the slide. D) High contrast can be created by using different shades of the same color.

Computer Science & Information Technology

What does a keygen do?

A. Generates a list of user names and passwords for network administrators. B. Creates CAPTCHA images. C. Analyzes typing patterns to authenticate a user. D. Creates software registration numbers.

Computer Science & Information Technology

During a recent investigation, an auditor discovered that an engineer's compromised workstation was being used to connect to SCADA systems while the engineer was not logged in. The engineer is responsible for administering the SCADA systems and cannot be blocked from connecting to them. The SCADA systems cannot be modified without vendor approval which requires months of testing. Which of the following is MOST likely to protect the SCADA systems from misuse?

A. Update anti-virus definitions on SCADA systems B. Audit accounts on the SCADA systems C. Install a firewall on the SCADA network D. Deploy NIPS at the edge of the SCADA network

Computer Science & Information Technology