Ask Question, Ask an Expert


Ask Computer Engineering Expert

problem 1: How does a structure distinct from an array? Describe your answer with simple illustrations.

problem 2: Describe how a structure distinct from a union? describe your answer with simple illustrations.

problem 3: prepare sample code to declare a union named 'clothes'. The union has two variables 'shirt' and 'blouse' and its members are:

Manufacturer of type character and size 20
Cost of type float
Size of type character (ex: S – small, M – medium, L - large and XL- extra large)

problem 4: Describe what a nested structure is. Describe your answer with an appropriate ex.

problem 5:

a) Define a structure comprising of two floating point members called real and imaginary. Comprise a tag called complex in the definition.

b) Declare three variables x1, x2 and x3 of be structures of type complex.

c) Assign the initial values of 1.3 and -2.2 to the member’s x.real and x.imaginary, correspondingly.

d) Declare a pointer variable px to point to a structure of type complex.

e) Declare a one-dimensional 100-element array called cx whose elements are structures of the type complex.

f) Combine the structure definition and the array declaration of part (v) into one single declaration.


i) Define a union called 'dateTime' that contains three members: hour, minute and second.                     
ii) Define a structure called 'calendarDate' that contains three integers members: day, month and year and a member time1 of type dateTime.     
iii) Declare a variable date1 of type 'calendarDate'.
iv) Set the time of date1 to: 10:30:25.   

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M96284

Have any Question? 

Related Questions in Computer Engineering

In computer science when we encounter an algorithm we often

In computer science, when we encounter an algorithm, we often need to ask about the complexity of that algorithm (how many computations we need to do). To find the complexity of the distance vector's algorithm, find the ...

Abm and oop agent-based modeling shares many features with

ABM and OOP Agent-based modeling shares many features with object-oriented programming (OOP). In some ways ABM and OOP are very different from each other. OOP describes a class of potential programming languages, whereas ...

Change the implementation of the gettax method in the

Change the implementation of the getTax method in the TaxReturn class, by setting a variable rate1_limit, depending on the marital status. Then have a single formula that computes the tax, depending on the income and the ...

Assignmentdefineupdate the security objectives for

Assignment Define/update the "security objectives" for confidentiality, integrity, and availability of information resources, describing the potential harm/security impact that failure to achieve security objectives woul ...

1 what are all the possible resulting values of w x y and z

1. What are all the possible resulting values of w, x, y, and z? For each possible outcome, explain how we might arrive at those values. You will need to examine all possible inter leavings of instructions. 2. How could ...

1 why is it important to use a structured systematic method

1. Why is it important to use a structured, systematic method for designing networks? What problems can occur if such methods are not used? 2. Compare and contrast the top-down network design method shown in Figure 1-1 w ...

Using the internet research wireless lan applications

Using the Internet, research wireless LAN applications. Compile a list of at least five applications that you had not imagined before for WLANs, and write a one-paragraph description below each one. The paragraph should ...

Metrics paperresearch the following topicmetricsreview nist

Metrics Paper Research the following topic: Metrics Review NIST SP 800-55 Rev. 1, Performance Measurement Guide for Information Security. Discuss measures you would be interested in finding the results, based on your hom ...

Part -1objectivethis lab will introduce the student to the

Part -1: Objective: This lab will introduce the student to the basics of data recovery, from a disk that's been formatted. Please note that the procedures in this document are not forensically sound, but illustrate the b ...

1 what is a discontiguous network why does it pose

1. What is a discontiguous network? Why does it pose challenges for a network designer? 2. Why is it important to characterize a network's logical topology and not just its physical topology? What information does a logi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro