1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zloy xaker [14]
3 years ago
10

What is library function? list any three library function​

Computers and Technology
1 answer:
attashe74 [19]3 years ago
7 0

Answer:

Library Functions: Library functions are the ones which are predefined functions.

Explanation:

Library Functions must be used along with the appropriate header files .

Header files contains the signature of library functions.

Using these functions it reduces the time of the programmer .

List of some library Functions:(in C Language)

  1. printf()
  2. scanf()
  3. sqrt()
  4. strcpy()
  5. strcmp()

You might be interested in
What is the code range for the integumentary system subsection in the cpt coding manual?
boyakko [2]
The code range is <span>10021-19499
</span>

Procedures on the integumentary system have their codes that range within 10021 – 19499 of the CPT manual. This is the 1st subsection of surgery. You will find codes for skin tag removal, incisions, and wound debridement at the front of the integumentary system.



6 0
4 years ago
The iso 14001:2004 standards require documentation of a firm's environmental program. Which component requires a plan to improve
In-s [12.5K]

The component that requires a plan to improve performance in resource use and pollutant output is the environmental management system.

<h3>What is a pollutant?</h3>

Pollutant simply means a substance that is harmful to the environment.

In this case, the component that requires a plan to improve performance in resource use and pollutant output is the environmental management system.

Learn more about pollutant on:

brainly.com/question/25537936

#SPJ12

8 0
3 years ago
What are some examples of everyday coding? (ex: phones, computers, etc.)
Maslowich
Im guessing you mean where coding is used?
pretty much anything with lights or a button

but, examples:
(some) watches
(newer) cars
planes
boats
credit cards (using one requires code to be ran)
Cash registers
(some) safes
Alarm Clocks
Routers
ATMs
eBooks
Cellular Sattelites
Weather Sattelites
Energy Grids
Water Plants
Sewage
Anywhere where mail is sorted

8 0
4 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
Which of the following applies to a trademark?
Lemur [1.5K]

Answer:

a

Explanation:

4 0
3 years ago
Other questions:
  • • Describe the steps in detail that the operating system performs to handle interrupts, including ISRs, the stack, and hardware?
    5·1 answer
  • A collection of related files that serves as a foundation for retrieving information is a: byte
    12·1 answer
  • What technology changes led to industrialization?
    15·1 answer
  • is either the number of bits used to indicate the color of a single pixel, or the number of bits used for each color component o
    7·1 answer
  • Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
    9·1 answer
  • The false reject rate describes the number of legitimate users who are denied access because of a failure in the biometric devic
    11·1 answer
  • Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how ma
    9·1 answer
  • This is the term popularly used to describe fixing errors in a computer program.
    9·2 answers
  • Worksheet Identify the devices for moving the cursor around your computer screen
    12·1 answer
  • - A blacksmith is shoeing a miser's horse. The blacksmith charges ten dollars for his work. The miser refuses to pay. "Very well
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!