1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
2 years ago
14

What dod instruction implements the dod cui program

Computers and Technology
1 answer:
Alexxandr [17]2 years ago
3 0

Answer:

oDI 5200.48 implements the DOD CUI program as required by EO 13556

Explanation:

You might be interested in
The scope of a variable declared outside of any function is:
pishuonlain [190]

Answer:

The correct answer for the given question is option(A) i.e Global

Explanation:

The global variable is the variable which is declared outside the function The lifetime and scope of global variable  in whole the program i.e "Globally" .They can be access anywhere in the program,however local variable are those which is declared inside the function .local variable are access inside that function only where it is declared.

Following are the example of Global variable.

#include <stdio.h> // header file

int t=9;// global variable declared outside the function

int main() // main function()

{

   printf("%d",t); // display the value of t

   return 0;

}

so the correct answer is Global.

5 0
3 years ago
#include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid &gt; 0 ) { value += 20; } printf(val
ss7ja [257]

Explanation:

To understand how this program is working let us print the variable value at different stages of the program so that we can understand how it is working.

Intitally, value=10 when it was declared.

Then we added 5 and it become value=15

then we used fork() function which creates a parent(orignal) and child(duplicate)

When fork() succeeds it returns the child pid to parent and returns 0 to the child. As you can see (pid > 0) condition is always true therefore the parent pid value becomes 35 ( 15+20) and the child pid value becomes 0.

#include <stdio.h>

#include <unistd.h>

int main( ) {

   int value = 10;

     printf("%d\n",value);

   int pid;

   value += 5;

     printf("%d\n",value);

   pid = fork( );

     printf("%d\n",pid);

   if (pid > 0 )

   {

       value += 20;

   }

   printf("%d\n",value);

   return 0;

}

Output:

10 (initial value)

15 (modified value)

5343 (pid when fork is used)

35 (final modified value)

0 (child value)

15 (the parent value when fork was used)

8 0
4 years ago
Select the correct answer.
vredina [299]
The answer is B I did the test
4 0
3 years ago
Do you think privacy policies are effective in social networking sites?
Kamila [148]

Answer:

When that information gets posted online, it is no longer private, and may end up falling into wrong hands. Even if you have put in place the highest possible security measures, some of your friends, colleagues and companies you interact with on social media, can end up leaking your personal information.

4 0
3 years ago
Write an algorithm to calculate the multiple of 5<br>​
Sauron [17]

Answer:

Multiples of 5 are 5, 10, 15, 20, 25,...

6 0
3 years ago
Other questions:
  • How many bits do you need to count up to 30 help please
    14·1 answer
  • What is the red wavy underline beneath the text
    7·1 answer
  • Which of the following can indicate what careers will be enjoyable ?
    5·1 answer
  • You need to transmit PII via email and you want to maintain its confidentiality. Which of the following choices is the BEST solu
    8·1 answer
  • What would you need to install if you have an app that is incompatible with your current operating system?
    13·1 answer
  • Ted is looking for a reliable source for his paper. Which of the following sites would be considered reliable?
    5·1 answer
  • What is referred to by the phrase “Web 2.0”?
    11·1 answer
  • Eric wants your help in remembering which of the following options corresponds to a dialog box that alerts the user to an error
    15·1 answer
  • Which type of boot authentciation is more secure?
    13·1 answer
  • Why is cyberbullying so devastating to many people beyond just the victim?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!