1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
4 years ago
15

Consider the following code snippet:

Computers and Technology
1 answer:
satela [25.4K]4 years ago
3 0

Answer:

1. Buffer could be overflowed when input entered by user in command line is greater than size 12 it may of size 13 or larger.

for example: when user enters the string 'dolatsinghsodha' than the size of that string stored in bar variable will be 15 as it not size bounded but when it stored in MyArray[12] than it will overflow the buffer for array because MyArray[] is input bounded to maximum 12 characters.

2. There are two ways to prevent buffer overflow

    i) make bar varaible input bounded to 12 characters or

    ii) assign MyArray[] size at dynamic time

  or change code to following state:

        void simple (char *bar) {

           int a=bar.length

          char MyArray[a];

        strcpy(MyArray, bar); // copies bar in MyArray --> Myarray==bar }

        }

         but it in not possible in some  languages and platforms

  or we can ask user

You might be interested in
in a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n)-------------------- respon
nataly862011 [7]

Answer:

Conditioned response

Explanation:

In a famous experiment a dog drool at a sound that is made just before meals. This is considered a(n) conditioned response.

The dog has been conditioned to respond to the constant sound before his meal is served by drooling(salivating ) with the expectation of eating almost immediately after the sound had been made .

4 0
3 years ago
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
Dmitriy789 [7]

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

7 0
3 years ago
What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoax
Ilya [14]

I think the answer is spam
5 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
What is the difference between the Paste Special and Paste Link options?
kotegsom [21]
Paste Link lets you automatically update the referenced document.
8 0
4 years ago
Read 2 more answers
Other questions:
  • What must you do first in order to change the font type size and colour of a particular text
    13·2 answers
  • A file to which information is written is referred to as a(n) ____ file.
    8·1 answer
  • You order a new personal computer. A representative from the store calls to ask if you need CD-copying software in your personal
    12·1 answer
  • If the list above is named list1 and is implemented as a list, whatstatement would you use to find the number ofelements?list1.s
    9·1 answer
  • A user calls you and says that when they try to connect to the internal website, they are prompted for authentication. The user
    14·1 answer
  • One of your professors has asked you to write a program to grade her midterm exams, which consist of only 20 multiple-choice que
    15·1 answer
  • All portions, to include subject, title, paragraphs, sub-paragraphs, graphics, tables, charts, and bullet statements, must be pr
    12·1 answer
  • The spreadsheet below shows a list of fruits with their calorie count, grams of sugar, dietary fiber, and protein. Which set of
    8·1 answer
  • or each array created, the name of the array becomes the name of the pointer constant created by the compiler for the array, and
    6·1 answer
  • A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!