Write a function that accepts a pointer to a C-string as an argument and returns the number of words contained in the string. For instance, if the string argument is 'Four score and seven years ago,' the function should return the number 6. Demonstrate the function in a program that asks the user to input a string and then passes it to the function. The number of words in the string should be displayed on the screen.

Answers

Answer 1

Answer:

To preserve the original format of the answer, I've added it as an attachment

Explanation:

This line defines the function

int countWords(const char ptr){

   

This line initializes number of words to 0

   int words = 0;

The following iteration is repeated until the last character in the argument is reached

   while(*(ptr) != \0){

This checks if current character is blank

       if(*ptr==  ){

If yes, then it increments number of words by 1

        words++;

 }

This moves the pointer to the next character

       ptr++;

   }

This returns the number of words in the argument

   return words+1;

}

The main begins here

int main() {

This declares user input as a character of 200 length

   char userinput[200];

This prompts user for input

   cout << Enter a string: (200 max): ;

This gets user input

cin.getline(userinput, 200);

This passes the c-string to the function and also prints the number of words

cout << There are  << countWords(userinput)<< words;


Related Questions

Please have a look at the screenshot below

Answers

C. Reliability

Because of the network and recovery time



Plz give brainliest

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

It is always better to get at least 3 times the amount of b-roll needed

True
False

Answers

Answer:

true

Explanation:

What is one feature that differentiates social media information systems (SMIS) from Web site applications? A user has to login to a Web site to use the special features. SMIS do not use browsers. A user can comment on a Web site. SMIS has more users than a Web site. SMIS has connection data

Answers

Answer:

A user has to login to a Web site to use the special features.

Explanation:

This is true because, even though website could be able to give the required information needed at that particular point in time, in order to use the special features found in the website, there is need to login into the website.

For example, Brainly which is a website needs the students to login in-order to ask his or her questions where not clarified with an expected answer gotten from the website.

To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as appropriate image dimensions and
resolution.
magnification.
orientation.
colors.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

resolution. magnification. orientation. colors.

The correct option to this question is 1. i.e.

Resolution.

The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.

While other options are not correct because:

Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.

Answer:

B C E

A web page is taking too long to load. It contains only a small amount of text and two images. Choose all items that represent possible causes.

large font size

images do not use a compressed format like JPG

image resolution too high

image resolution too low

image dimensions too large

Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when many developers may be working on the same code. Support your answer with an appropriate visual that you find from the internet.

Answers

Answer:

Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.

Explanation:

Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.

write passage on computer virus​

Answers

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.

Answer:

A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.

hope it helps

One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files

Answers

C using old versions of software

While your hands are on home row, both of your thumbs are on _____.

Answers

Answer:

While your hands are on home row, both of your thumbs are on Space-barI know this will definitely help✍️✍️✍️

Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable.
Public class Employee
{
Private String empID;
Private boolean hourly;
) . .
_______
{
Hourly = isHourly;
}
}
A) public void setHourly(String isHourly)
B) public void getHourly()
C) public boolean getHourly()
D) public boolean setHourly(boolean isHourly)

Answers

Answer:

A)

Explanation:

In this code example the missing piece of code would be...

public void setHourly(String isHourly)

This piece of code is creating a function called setHourly which takes in one String variable as it's parameter. Based on the rest of the code, the function takes that parameter variable and places it into an instance variable called Hourly which can be used when the function is called.

An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)

Answers

Answer:

polynomial-bounded algorithms

Explanation:

There are two algorithm complexities and they are time and space complexities. They can be denoted with the big-O notation. The big-o notation for a time and space complexity gets the worst-case time and space respectively.

The time complexity gets the measure of the execution time of an algorithm. When the time function is a polynomial ( k^n + k^n-1 ...) then the algorithm is said to be a polynomial-bounded algorithm.

What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g

Answers

Answer:

Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.

Explanation:

The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.

SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.

Which tools can Object Drawing Mode be applied to?
Line tool
Rectangle Tool
Oval Tool
Pencil tool
Pen Tool
Brush Tool

Answers

Answer:

• Line Tool

• Rectangle Tool

• Oval Tool

• Pencil Tool

• Brush Tool.

Explanation:

When people want to animate when using the Adobe Animate CC, it is vital for them to know how to draw shapes like squares, lines, ovals, rectangles, and circles. This is to enable such individuals understand how to draw objects as it can be difficult if they do not know how to draw these shapes.

The tools that Object Drawing Mode be applied to include:

• Line Tool

• Rectangle Tool

• Oval Tool

• Pencil Tool

• Brush Tool.

When the tool is being selected, it should be noted that the option for the drawing mode will be shown in the Property Inspector panel or it can also be seen in the tools panel.

Documenting findings, actions, and outcomes of network troubleshooting calls is an essential part of the troubleshooting process. List the reasons why documentation is critical, and discuss the form that this documentation could take (e.g. blogs, wikis, professional document management software, etc). Include a detailed description of what information would need to be saved.

Answers

Answer:

The main purpose of documentation is for future reference on the cost, materials, procedures, and techniques used in a task. It can be in form of a video log, report, digital text document or software, etc.  

Explanation:

Documentation is an important practice of taking notes of events during a process. It could in the process of creating or discovering new ideas or repair or management of existing processes. It holds the time, cost, technique, event name, measures-taken, etc, that would totally describe the event.

How might use of computer and knowledge of technology system affect personal and professional success

Answers

Answer:

social media

Explanation:

What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer among the given options to this question is:

Knowledge of HTML is not required.

Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”)  editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”)  automatically inserts the HTML for the form and button on a website page.

While other options are not correct because:

Using the WYSIWYG (“what you see is what you get”)  editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”)   website templates are mostly used and modified using WYSIWYG editor.

Answer:

(C):Knowledge of HTML is not required.

FELLING GENEROUS GIVING AWAY POINTS:)


Who plays Lol btw (league of legends)
ADD me ign : Davidoxkiller (euw server)

Answers

Answer:

thanksssssssss

Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.

Answers

Answer:

An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)

Explanation:

Many electronic devices use a(n) integrated circuit which contains all the circuit parts in a miniature form.

The use of  integrated circuit is known to be a kind of a single, miniature circuit that has a lot of electronically connected parts that are designed onto a small piece of silicon or semi conductive material.

A lot of electronic components are known to be capacitors, inductors, resistors, diodes, transistors and others.

Learn more about electronic devices from

https://brainly.com/question/11314884

Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them

Answers

Answer:

A, template specifics, such as horizontal or vertical menu layout

Explanation:

Answer:

D. who will be using the site and the design theme selected for them

Explanation:

I am doing the exam right now.

what is meant by resources of computer

Answers

This question is not specific enough. However, a computer helps you listen to music, read articles and even novels, draw using online platforms, play games, etc.

How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either the string 'RXS' or string 'ZU' in the 7 characters string?

Answers

Answer:

Following are the solution to this question:

Explanation:

In the following forms, RXS can appear:  

[tex]R X S \_ \_ \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ R X S \_ \_ \_[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ R X S \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ \_ R X S \_[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ \_ \_ R X S[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

And we'll have a total of [tex]24 \times 5 = 120[/tex] permutations with both the string RXS.

In the following forms, UZ can appear:

[tex]U Z \_ \_ \_ \_\ _[/tex]  They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ UZ \_ \_ \_ \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ U Z \_ \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ U Z \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ \_ U Z \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ \_ \_ U Z[/tex] They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

There may be [tex]120 \times 6 = 720[/tex] ways of complete permutations.

In C 11, the ________ tells the compiler to determine the variable's data type from the initialization value.

Answers

Answer:

auto key word

Explanation:

the auto keyword in c++11 can be regarded as one of the features of

“Type Inference” . It should be noted that in In C ++11, the auto key word tells the compiler to determine the variable's data type from the initialization value.

write the code that writes access granted if the correct password, swordfish is entered and access denied! otherwise

Answers

In python 3.8:

if input("Enter password: ") == "swordfish":

   print("access granted")

else:

   print("access denied!")

For things like school, you should have a more serious:

Answers

Answer:

who and what do you mean

Explanation:

Drag the tiles to the correct boxes to complete the palrs.
Match the types of letters with their descriptions.
letter of interest
cover letter
thank you letter
letter of recommendation
discusses how you meet job requirements
>
reiterates why you're the best candidate for the job
>
tells more about your character and who you are
expresses your interest in working for a company

Answers

Answer:

Letter of interest> tells you more about your character and who you are expresses your interest in working for a company

Letter of recommendation> reiterates why you're the best candidate for the job

Cover letter> discusses how you meet job requirements

Hope this helped!

Answer:

Discusses how you meet job requirements = Cover Letter

Expresses your interest in working for a company = Letter of Interest

Tells more about your character and who you are = Letter of Recommendation

Reiterates why you're the best candidate for the job = Thank You Letter

Question #3
Multiple Choice
Which statement is true?
O A collection is a type of deque.
O A list is a type of deque.
O A deque is a type of list.
O Adeque is a type of collection.

Answers

A deque is a type of list

Answer:

D. A deque i a type of collection

Explanation:

I do computer science too ;3

Match the following internet related terms to their definition

Answers

Answer:

1st buble goes to web address 2nd goes to browser 3rd goes to chat 4th goes to email

Explanation:

Write a program (using functions) starting from directives to compute and display the transpose of a matrix of dimension m x n. [Note: Here, transpose of a matrix means the element at row r and column c in the original is placed at row c and column r of the transpose]. (Programming in C)

Answers

Answer:

#include <iostream>

#include <cstdlib>

using namespace std;

int m, n;

void transpose(int matrix[]){

  int transp[m][n];

  for (int i = 0; i < n; i++){

     for (int j = 0; j < m; j++){

        transp[j][i] = matrix[i][j];

        cout<< transp[j][i]<< " ";

     }

     cout<< "\n";

  }

}

int main(){

  cout<< "Enter the value for n: ";

  cin>> n;

  cout>> "Enter the value for m: ";

  cin>> m;

  int mymatrix[n][m];

  for (int i = 0; i < n; i++){

     for (int j = 0; j < m; j++){

        mymatrix[i][j] = (rand() % 50);

     }

  }

  transpose(mymatrix);

}

Explanation:

The C source code defined a void transpose function that accepts a matrix or a two-dimensional array and prints the transpose on the screen. The program gets user input for the row (n) and column (m) length of the arrays. The C standard library function rand() is used to assign random numbers to the array items.

Bluetooth uses this medium to connect two devices.
Select one:
a. microwave signals
b. fiber optics
c. infrared light
d. radio signals

Answers

Answer:

D

Explanation:

Bluetooth is the wireless technology which allows for the exchange of the data between different devices. It uses wavelength to transmit information and generally works with short rage devices.

Due to Bluetooth relies on the range of devices and hence it depends on the UHF radio waves. These have a range of 2.4 to 2.5 Ghz. Such that the devices can talk to each other. The usage is control automation system.

Hence the option D is correct.

Learn more about the uses this medium to connect two devices.

brainly.in/question/5681178.

list any three importance of computer​

Answers

Answer:

here is the answer

Explanation:

1) accurate

2) fast

3) can accomplish tasks more effencily

Other Questions
Answer these for brainliest:General Questions Why did members of the political machines stuff ballot boxes?2. What happened to federal officials who took bribes from whiskey makers during President Grants second term?3. If government officials were replaced after each presidential election, what effect would this have on the governments work force?4. Which presidents tried to reform government corruption before 1883?5. In what two ways did the Pendleton Act change the hiring process for federal jobs?6. What sorts of reforms did the Progressives want?7. What audience do you think muckrakers were trying to reach?8. Name three writers who urged reforms.9. What resulted from the publication of Upton Sinclairs novel The Jungle?10. What is your opinion of the importance of city planners and engineers?11. When did the first public kindergarten open in the United States?12. How were Deweys ideas on education different from earlier methods of teaching?13. What ballot change did many states make after being pressured by Progressive reformers?14. How did the right to recall officials give voters more political leverage?15. What is the difference between initiative and referendum?16. What effects resulted from Prog Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes: Character Code A 1 B 00 C 01 D 10 E 0 The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct? at the left.6.1. Work equalsA force x distanceB. force - distanceC. force + distance.The force you apply to a machineis theA. input force.B. output force.C. efficiency.2.The unit of work is theA. watt.B. newton.C. joule.7.The efficiency of all realmachines isA. greater than 100%B. equal to 100%C. less than 100%3.Power is the amount ofA. work done per unit of time.B. force on a certain area.C. pressure in a volume of liquid.8.4.The unit for power is theA. joule.B. Meter per secondC. watt.The fixed point that a lever rotatesaround is called theA. fulcrum.B. input force.C. wedge.9.5.A machine cannot change theA. direction of the input force.B. amount of work needed to doA screwdriver is an example of asimple machine called aA. pulley.B. screwC. wheel and axle.a task.C. distance over which a forceis applied10.Your front teeth areA. wedges.B. levers.C. compound machines. Based on what you have read, explain how the central idea of The Evolution of Useful Things connects to the unit theme of setting goals, Find the value of x and the measure a.Which of the following is FALSE?The events at the Alamo and Goliad encouraged more support for Texas Independence from theUnited Statesb The events at the Alamo and Goliad encouraged Texans to continue the fight for independence.Santa Anna's brutal treatment of the Texans who surrendered at Goliad angered both Texans andMexicans in Texas.d. "Remember the Alamo" and "Remember Goliad" became battle cries for the Mexican army.C Do you feel that the clothes we wear and the way we present ourselves accurately reflects who we are and what we are capable of? Explain your answer. 10 sentences please !!! If not 7..-your claim-3 supporting reasons-details and descriptive words -your conclusion What was Ab Bakrs contribution to the spread of Islam? Competition among sellersAlowers costs and prices.Braises costs and prices.lowers costs and raises prices.Draises costs and lowers prices. Plz help!Researchers have been studying how emissions from both volcanoes and human activities, such as the burning of fossil fuels, impact the atmosphere. Both types of emissions contribute to the total CO2 levels in the atmosphere. Graph 2 shows that atmospheric CO2 levels have been steadily increasing over time. This increase in CO2 levels has been linked to the increase in global surface temperatures.Explain why the total mass of carbon must be decreasing in a different step of the slow carbon cycle based on the on the increase in atmospheric CO2. Write the unit fraction depicted in the model as a percent.One-fourth Describe the scope of the variables in this code.class pet: def __init__(self,strSpecies,strName): self.species = strSpecies self.petName = strName def __str__(self): return self.species + " named " + self.petName def changeName(self, newName): self.petName = newNameclass petCarrier: size = 'medium' color = 'red'The scope of petName ______.The scope of color is ______.Accessible to the entire programlimited to the petCarrier classlimited to the pet class(both of the blanks need one of those answers) What fraction is equivalent to 1/6A. 3/8B. 2/8C. 3/24D. 4/24 In DNA, different alleles of a gene have a different sequence of ___________________. Alleles may have a different sequence of ___________________ in RNA that result in a different sequence of _________________ in a protein. Therefore, proteins produced from different alleles of a gene may have different structures and functions and result in different characteristics. Points and Brainliest Giveaway!Write a 2 paragraph summary on the Pardoner's tale from Chaucer's "The Canterbury Tales." As an American citizen, you do not have a right to own a gun. A True B False The value of a new car decreases by about 15% in the first year. How much will a car be worth after one year if its initial value was $1,500? If you get stuck, consider using diagrams or a table to organize your work. 20 POINTS I NEED THIS PLEASEWhat West African empire rose to take Ghanas place in the mid-thirteenth century? How did it gain power, and what did its emperor to do unite the kingdom?I know it was Mali, and it gained power through controlling the salt and gold exchange, but my book doesnt mention how Sundiata united the kingdom, and google isnt helping help me please and you will be legend and nice Please help me!!!!!!