1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
3 years ago
9

To define a c-string that will store students' last names of up to 25 characters in length, which is an appropriate statement?

Computers and Technology
1 answer:
kirill115 [55]3 years ago
3 0
The answer is : char lastName[26];
This is the appropriate statement <span>to define a C-string that will store students' last names of up to 25 characters in length.  </span>C-string is a string whose characters are stored in consecutive memory locations, and are followed by a null character, or null terminator.
You might be interested in
The first widely adopted windows product, ____, featured a standardized look and feel, similar to the one made popular by apple'
slega [8]
<span>The first widely adopted windows product, Windows 3, featured a standardized look and feel, similar to the one made popular by Apple's Macintosh computer .
</span>
Microsoft’s Windows operating system was first introduced in 1985, Windows 3 which was released in 1990 was the first version to see more widespread success, because it had the ability to run MS-DOS programmes in windows which brought multitasking in programming.


8 0
3 years ago
Define a function called strip_punctuation which takes one parameter, a string which represents a word, and removes characters c
DaniilM [7]

Answer:

punctuation_chars = ["'", '"', ",", ".", "!", ":", ";", '#', '@']

def strip_punctuation(strWord):

   for charPunct in punctuation_chars:

       strWord = strWord.replace(charPunct, "")

   return strWord

Explanation:

The function is defined with a single argument.

A for loop is ran to check each character of the the word.

If a punction mark is present as a character in the word, it is removed.

The same word is returned but without the punctuation marks.

8 0
3 years ago
List three ways you can help someone who is being bullied in of just being a bystander​
nignag [31]

Answer:

1.) Let a teacher, administrator or other safe adult know about what's going on.

2.) If someone is being physically harmed, you can call the police or 911.

3.) If the bullying is mild, (Name calling, insults, etc.) you can attempt to step in.

Explanation:

N/A

8 0
3 years ago
What is a video input device? .​
iren2701 [21]

Video input devices are used to scan images or videos from the outside world to the computer. The information can be stored in a multitude of formats depending on the user's requirements. Examples of types of video input devices include: digital camera. Digital camcorder.

7 0
3 years ago
List at least 5 features that can be used to format a report in word 2013
Masteriza [31]

Answer:

Following are the features for formatting a report in word 2013

  1. Design Tab
  2. Convenient Layout options and alignment
  3. Resume work option
  4. Managing longer documents in a better way
  5. Enhanced table features

Explanation:

In word 2013, many of the new features were introduced:

  • The design tab was given a new look, including templates options and much more.
  • The layout option was also made much convenient by putting all necessary option under the right-click option.
  • Word started to present an option for resuming the work were you left last time. This made the working much efficient.
  • By dealing with headings the word 2013 version made it easier to compact the document by collapsing heading and focus on the specific part you want.
  • Many of the options were added to tables formatting such as border, colors, line weight and much more.

i hope it will help you!

8 0
3 years ago
Other questions:
  • Liam is a hacker who tries to access Wi-Fi signals while driving his car. What type of wireless network attack is this?
    9·1 answer
  • Point out the wrong statement.
    10·1 answer
  • Write an application that displays the sizes of the files lyric1.txt and lyric2.txt in bytes as well as the ratio of their sizes
    15·1 answer
  • Computer identity theft differs from theft in the real world in what major way?
    11·2 answers
  • Identify the programming language released by
    10·1 answer
  • Complete the program below named CountVowels so that it reads in a string, counts all the vowels in that string, and prints out
    13·1 answer
  • Select the best answer from the drop-down menu.
    14·2 answers
  • What is the difference between a threat and an attack?
    7·1 answer
  • Which three characteristics help identify a business opportunity? (Choose three)
    14·1 answer
  • Enterprise software is designed for organizations to __________.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!