1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DanielleElmas [232]
3 years ago
15

What does this call to strcmp return?

Computers and Technology
1 answer:
Murljashka [212]3 years ago
3 0

Answer:

The correct for the given question is option(c) i.e .-1.

Explanation:

Strcmp() function is used to compare the two string .it compare the string character by character strcmp() function return the three value on comparison.

(1) if string 1 is equal to string 2  it return 0;

(2) it return>0 if  string1  has greater ASCII value than string 2

(3) it return <0 if  string1  has smaller ASCII value than string 2

In the given code strcmp returns -1 value the ASCII code of character 'A' has smaller then ASCII code  'X';

Following are the program of given code

#include<stdio.h>// header file

#include<string.h>

int main() // main method

{

 char x;

x =strcmp( "ABCD", "XXX" );

printf("%d",x);

return 0;

}

Output:-1

You might be interested in
How can i turn on my prinfer without getting up
Maksim231197 [3]
Go to your computer settings at turn printer on
5 0
3 years ago
Read 2 more answers
Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must
serg [7]

AnswLab giya j ty dy dio:

Explanation:

6 0
2 years ago
Which website allows you to host your podcast for at a cost that includes your domain name?
scZoUnD [109]

Answer: WordPress

Explanation:It is a kind of website where you can publish your content on any thing and can also buy domain there,if wanted

8 0
3 years ago
Read 2 more answers
The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
ddd [48]

Answer:

The statement is True

Explanation:

When talking about computer security, we can define covert channels as an attack on a system capable of creating a loophole for information objects transfer between various processes that would normally not allow communication under the computer security policy. Hence, the best defenses system against this kind of attack is via Intrusion Defense System and Intrusion Prevention System and relentlessly "watching all aspects of an IT infrastructure for aberrant or abnormal events of any type."

7 0
3 years ago
The systems development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems t
MissTica

Answer:

the system development life cycle (SDLC) is the overall process of developing, implementing, and retiring information systems through a multistep process—initiation, analysis, design, implementation, and <u>maintenance to disposal.</u>

Explanation:

There are several  SDLC models and each generally consists of a numbers of definite stages. For a given adopted SDLC model, information security and product services must be integrated in to the SDLC to ensure appropriate protection for the information that the system will transmit, process, and store.

8 0
3 years ago
Other questions:
  • Which network could NOT carry commercial traffic?
    5·1 answer
  • A user can easily move to the end of a document by pressing the _____ key combination.
    10·2 answers
  • Write a program using nested loop to produce the following output:
    6·1 answer
  • A colleague asks you to research a CPU for a new server that will run Windows Server 2019. He explains the server roles that he
    7·1 answer
  • Suppose that f is a function with a prototype like this: void f(________ head_ptr); // Precondition: head_ptr is a head pointer
    6·1 answer
  • Choose all stages of the information processing cycle.
    12·2 answers
  • If the starting address location changes, in which of the following cases, the program has to be recompiled? Select one: a. Both
    12·1 answer
  • A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure
    13·1 answer
  • Design algorithm and the corresponding flow chart for adding the subject score of 5, total value and rank.​
    14·1 answer
  • A. In I/O interation between OS and devices, describe how hybrid mechanism works?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!