Answer:
Option c is correct.
Example :
public class Subject
{
public static void main(String [] args)
{
int ar[]={5,4,6,7,8};
System.out.println("the number of array elements are: ",ar.length);
}
}
Explanation:
The above program is created in java language in which Subject is a class name.Inside Subject class , there is main method.
Inside the main method, there is An array named 'ar' which data type is an integer and we have assigned the value to this array.
in the next line, we are printing the total no. of the element in the array with the length function which displays the length of an array or variable.
Answer:
To do this you'll need to use malloc to assign memory to the pointers used. You'll also need to use free to unassign that memory at the end of the program using the free. Both of these are in stdlib.h.
#include <stdlib.h>
#include <stdio.h>
#define SIZE_X 3
#define SIZE_Y 4
int main(void){
int **matrix, i, j;
// allocate the memory
matrix = (int**)malloc(SIZE_X * sizeof(int*));
for(i = 0; i < SIZE_X; i++){
matrix[i] = (int *)malloc(SIZE_Y * sizeof(int));
}
// assign the values
for(i = 0; i < SIZE_X; i++){
for(j = 0; j < SIZE_Y; j++){
matrix[i][j] = SIZE_Y * i + j + 1;
}
}
// print it out
for(i = 0; i < SIZE_X; i++){
for(j = 0; j < SIZE_X; j++){
printf("%d, %d: %d\n", i, j, matrix[i][j]);
}
}
// free the memory
for(i = 0; i < SIZE_X; i++){
free(matrix[i]);
}
free(matrix);
return 0;
}
Answer:
Option(d) is the correct answer to the given question .
Explanation:
There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.
- The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.
- The Option (b) is wrong because In the key scheduling we do not used the the random key for the encryption process .
- The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.
Answer:
List items are usually accessed using the indexing operator.
Explanation:
Depends on the language, and what you mean with extracting? Do you mean accessing or removing?