1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
7

Which option is the strongest password?

Computers and Technology
2 answers:
tresset_1 [31]3 years ago
7 0

Answer:

Cats4Life

Explanation:

If john is persons name then it is kinda obvious

Delvig [45]3 years ago
7 0

Answer:

John$0763!

Explanation:

Includes Special Characters and Numbers and Capitals

You might be interested in
Complete the following function to create a deep-copy on the heap of the argv array. Set the result pointer to point to your arr
irga5000 [103]

Answer:

Following are the code in the C programming Language.

//define function

void duplicate(char*argv, char**result) {

//set and initialize the variable to 0

int c = 0;

//set and initialize the char type pointer variable

char** t = argv;

//set the while loop

while(t){

//increment by 1

c++;

//increment by 1

t++;

}

//set malloc function in the pointer variable

result= malloc(sizeof(char)*(c+1));

//set the for loop

for(int i = 0; i < c; i++) {

//set malloc function in the pointer

(*result)[i] = malloc(strlen(argv[i])+1);

//copy the character from memory

memcpy(argv[i], (*result)[i], strlen(argv[i])+1) ;

}

//initialize null in the pointer

(*result)[i] = NULL;

}

Explanation:

In the following code, we define function "duplicate()" and pass two character type pointer arguments "*argv" and "**result" and inside the function.

  • Set an integer type variable "c" and initialize to 0.
  • Set character type pointer variable "t" and initialize the value of pointer variable "argv".
  • Set the while loop and increment in the variable "c" and "t" by 1.
  • Set the malloc function in the pointer variable "result".
  • Set the for loop to copy the character from the memory.
  • Finally, initialize the pointer variable "result" to NULL.
8 0
3 years ago
Write the pseudocode for a program that will process attendance records of CA students. The students attend college five days a
Alenkasestr [34]

Using the knowledge of pseudocodes it will be possible to write a code that calculates the amount of hours worked and giving warnings about it.

<h3>Writing a pseudocode we have that:</h3>

<em>while </em>

<em>if number == 0</em>

<em>break</em>

<em>hours =0 </em>

<em>for i =1 to 5 </em>

<em>hours = hours + time_out[ i ] - time_in[ i ]</em>

<em> If hours >36 : </em>

<em>print ( "Name is " ,name)</em>

<em>print( "No of hours are ",hours)</em>

<em>print("Congratulaion! Your working hours are more than 36")</em>

<em>If hours <30 : #</em>

<em>print ( "Name is " ,name)</em>

<em>print( "No of hours are ",hours)</em>

<em>print("Warning !!!")</em>

<em>End loop</em>

See more about pseudocode at brainly.com/question/13208346

#SPJ1

3 0
2 years ago
The type of human hair wig that is the most costly is:
RSB [31]

Answer: india

Explanation:

5 0
4 years ago
The Internet and World Wide Web allow almost any business to be global. What are two important results of this process?
lubasha [3.4K]

Answer:

The two Important results of any business to be global is given below.

Explanation:

1.The Internet and World Wide Web allowing the easier and quicker way to getting started any business due to this we can sell the product online and make the business global.

2.The Internet and World Wide Web giving the quicker way to change the business if any changes are reflected in the business environment.

6 0
4 years ago
Select the correct answer.
miv72 [106K]

Answer: Format

Explanation: My head

3 0
3 years ago
Read 2 more answers
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revo
    15·1 answer
  • In Excel, an individual cell is the intersection of a row and a column.<br> True<br> False
    10·2 answers
  • Which tab on the ribbon houses the sort functions?<br><br> Insert<br> Data<br> View<br> Home
    11·1 answer
  • A(n) _________ is a formal access control methodology used to assign a level of confidentiality to an information asset and thus
    6·1 answer
  • The first synthesizers were small simple machines that were easy to use. a. true b. false
    12·1 answer
  • A network administrator has configured ​VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask.
    7·1 answer
  • Write down the different types of testing with their definition.
    11·1 answer
  • A program virus infect​
    10·1 answer
  • Low-level formatting ____. Group of answer choices is different from physical formatting is usually performed by the purchaser o
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!