1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oee [108]
3 years ago
6

With an example in each, describe the use of two basic functions which are known by the "string.h" header file.

Computers and Technology
1 answer:
olga nikolaevna [1]3 years ago
5 0

Answer:

strcmp(char * A, char * B);

strcat(char * A, char * B)

Explanation:

One of these basic functions is the function strcmp(char * A, char * B).

This functions compares if two strings are equal; If they are, it returns 0. If not, it returns 1;

So, an example:

char A[13] = "Buffalo Bills";

char B[13] = "Buffalo Bills";

if (strcmp(A,B) == 0)

printf("The strings are the same\n);

else

printf("The strings are not the same");

In this case, they are the same.

----------------------

If for example:

char B[13] = "Buffalo Billz"

It would fall in the else, A and B would not be the same strings.

--------------------------

Other function is the strcat(char * A, char * B);

This function takes two strings as an input, and concatenate them to the first.

For example:

char A[15] = "Buffalo";

char B[5] = "Bills";

strcat(A, B);

printf("%s\n", A);

The output is:

Buffalo Bills

You might be interested in
The web server administrator at your e-commerce company is concerned about someone using netcat to connect to the company web se
dangina [55]

Answer:

Banner Grabbing

Explanation:

Banner grabbing is a reconnaissance technique to retrieve information about a computer or about a network and its services. This is used by administrators to take inventory of systems and services on their network.

Banner grabbing is used to gain information about a remote server and is intruders sometimes use this technique to retrieve information about remote servers.  divulge software version numbers and other system information on network hosts. This is a technique of getting software banner information. This information may include operating system information, version and certain services and this helps hackers to attack the network. Banner grabbing can disclose vulnerable applications which can result in service misuse and exploitation.

Banner grabbing is done manually or automatically by using tools. Tools commonly used to perform banner grabbing are Telnet, Wget, nmap, zmap and Netcat etc.

4 0
4 years ago
Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
nikklg [1K]

Answer:

Algorithms.

Explanation:

Computer system is an electronic machine that receives input data, processes or executes these data and outputs the results. It comprises of two parts, the hardware and software components.

The computer receives data created by a process and inputted by individuals. The software components are the operating system and the application softwares running in the operating system. The application software follows a well defined stages of task to execute a task. This is called algorithm.

The application uses the algorithm to execute the task on the input data to give the required result.

8 0
3 years ago
Write a pseudocode to add the first 100 even numbers.
Allushta [10]

Even numbers are numbers whigh are divisible by 2. Therefore, the first even number is 2. A pseudocode which adds the first 100 even numbers can be written thus :

counter = 0

sum = 0

interval = 2

while counter < 100 :

sum = sum + interval

interval += 2

counter +=1

print(sum)

  • A counter takes count of the number of values summed

  • Initializes a variable which holds the sum of even values

  • Since even numbers are divisible by 2; every factor ; increase every added value by 2

  • The program ends once counter is 100

Learn more : brainly.com/question/25327166

6 0
2 years ago
Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is ide
ANEK [815]

Answer:

A

Explanation:

3 0
3 years ago
________ is a suite of protocols designed to connect sites securely using ip networks.
a_sh-v [17]
IPSec


Hope that helps, Good luck!! (:
7 0
3 years ago
Read 2 more answers
Other questions:
  • What are the names of each devices pleaseee​
    13·2 answers
  • A polyalphabetic cipher uses many ___
    6·1 answer
  • What makes us see continuously moving images when still images appear in rapid succession
    11·1 answer
  • Which of the following is not the name of an air mass?
    7·1 answer
  • Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
    8·1 answer
  • If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added te
    12·1 answer
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    14·1 answer
  • How many registers are there in the memory unit?
    8·1 answer
  • ______allow you to select elements that are in a certain state, such as when the mouse if hovering over an element
    14·1 answer
  • Consider the following method.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!