Hello <span>Enriqueliz5443</span><span>
Answer: Before using the data type string, the program must include the header file string
Hope this Helps!
-Chris</span>
Answer:
D. intelligent techniques.
Explanation:
Intelligent techniques are the artificial intelligence techniques used by computer that allow them to perform complex tasks just like humans perform those tasks.For example :- decision making,understanding word meanings.
Fuzzy logic,case-based reasoning and expert system are considered as intelligent techniques.
Computer is known as data processing system because it changes raw data that is not in useful form such as tables, figures, etc into processed data known as information that is useful. Processing includes manipulating, storing, accessing, and transmitting.
<u>Some recommend way to prove the authenticity of an email:</u>
- The coworker as truthful to the company or organization he or she has to check where the same mail is sent long back to the same sender.
- If search on emails sent item if he sends it will be well and good. Some time backup the mail will be help to proven authenticity of an email.
- Sometimes once mail is downloaded into ms-outlook or lotus domino some time mail persists in the mail server.
- He or she can coordinate with the mail server administrator to possible get a log file of sending mail and he can proceed as a record to management.
Answer:
All of the above.
Explanation:
API is an acronym for application programming interface and it can be defined as a software intermediary (computing interface) comprising of sets of codes, tools and protocols that helps software applications and the computer to communicate with each other, as well enable the exchange of data. Some examples of popular APIs are Go-ogle, Face-book, Twitter etc.
The main characteristics and functions of an application programming interface (API) includes;
I. Allows different devices to connect with each other.
II. Allows for Interactivity between devices and software.
III. Messenger program that takes requests and delivers the response back to the user.
IV. Allows the creation of applications that access the features or data of an operating system, application, or other services.
V. Specifies how software components should interact.
VI. Used when programming graphical user interface (GUI) components