1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
5

A U.S. social security number consists of a string of 9 digits, such as "444422333". Declare a char array named ssn suitable for

storing a social security number as a C-string, and write a statement that reads in the next 9 characters of standard input into this array. (Assume that the input consists of one big sequence of digits without spaces or newlines.)
Computers and Technology
1 answer:
tatuchka [14]3 years ago
8 0

Answer:

Since the question expect us to declare a C-string, the solution code is written in C as follows:

  1.    char ssn[9];
  2.    scanf("%s",ssn);

Explanation:

A C-String is a string written in C language. It is an array of characters. To declare a C-string, we use the keyword, <em>char </em>and then followed with the variable name + brackets and the number of characters in the string. For example, we can create a C-String for the SSN number as in Line 1.

To read standard input into the array, we can use C built-in function, <em>scanf(). </em>Just include a string placeholder, %s, and the variable<em> ssn </em>as arguments to <em>scanf()</em>. This will assign the string input by user to variable <em>ssn</em> as C-String.

You might be interested in
Is the IOT governable by frameworks? Explain your rationale.
polet [3.4K]

Answer:

Absolutely yes.

Explanation:

IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.

Some of the aspects that should be governed by these frameworks are;

i. Data confidentiality:

Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.

ii. Data integrity:

These data should also be assured of consistency and accuracy over a long period of time.

iii. Accountability:

When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.

8 0
3 years ago
What will be the output of the statement?<br> System.out.println(2*4*(8+3)-9%7);
Lapatulllka [165]

Answer:

87.37

Explanation:

(2*4*(8+3)-9%7)

(8*(8+3)-9%7)

8*(11)-9%7

88-8%7

88-0.63

87.3

7 0
3 years ago
A member of the human resources department received the following email message after sending an email containing benefit and ta
mihalych1998 [28]

Answer:

a. The DLP system flagged the message.

Explanation:

Data Leaked Prevention System is the software that detects potential data breaches that may result in the future. It detects the possible data breach, then monitors it and immediately blocks any sensitive data. DLP system is widely used by businesses. The human resource team received a message because sensitive information about the business benefits and tax is shared with a candidate.

8 0
3 years ago
Sentinel-controlled iteration is also known as ________. Question 2 options: A) indefinite iteration B) double iteration C) defi
Sunny_sXe [5.5K]

Answer:

Option(A) i.e " indefinite iteration " is the correct answer to the given question.    

Explanation:

Sentinel-controlled iteration is also called indefinite iteration because the user or programmer do not known in the beginning of the iteration how many time the loop will iterated and instruction are executed sometimes it executed the loop in the infinite times .

  • For example : when fetching the data from the file the user or programmer Don't know when we would finish the file in advance.
  • All the others options are not belonging to the Sentinel-controlled iteration that's why they are incorrect.

4 0
3 years ago
How do I make my kali Linux faster in my virtual box?
vagabundo [1.1K]
Not sure to be honest
7 0
3 years ago
Other questions:
  • Creating calendar events prevents individuals from being able to schedule a time to collaborate.
    11·1 answer
  • Name at least two primary forms of identification needed to obtain a learner’s license.
    10·2 answers
  • Hello my friends i am trying to reboot my i phone 4 but i could not i tried many ways can u help me
    14·1 answer
  • Design pseudocode for a program that will permit a user to store exactly 50 numbers in an array. Create an array big enough to h
    10·1 answer
  • What types of files are saved with the mp3 and zip extensions
    14·1 answer
  • A programmer is responsible for solving a problem and making a presentation that includes his solution. He does not have much ro
    15·2 answers
  • What is the use of folders in the computer system ?​
    14·1 answer
  • A mobile operating system is stored on a ___ chip.​
    11·1 answer
  • If known vulnerabilities in software are entry points for an attacker, why are the software vulnerabilities not corrected before
    12·1 answer
  • Identify two different uses/applications of data in which biases in word embeddings might cause significant ethical harms, then
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!