Answer:
See explaination
Explanation:
#include <stdio.h>
#include <stdlib.h>
int main()
{
FILE * file_object;
char file_name[100];
char ch;
int characters=0, words=0;
printf("Enter source file name: ");
scanf("%s", file_name); //asking user to enter the file name
file_object = fopen(file_name, "r"); //open file in read mode
if (file_object == NULL)
{
printf("\nUnable to open file.file not exist\n"); //check if the file is present or not
}
while ((ch = fgetc(file_object)) != EOF) //read each character till the end of the file
{
if (ch == ' ' || ch == '\t' || ch == '\n' || ch == '\0') //if character is space or tab or new line or null character increment word count
words++;
else
characters++; //else increment character count this assures that there is no spaces count
}
printf("The file story.txt has the following Statistics:\n"); //finally print the final statistics
if (characters > 0)
{
printf("Words: %d\n", words+1); //for last word purpose just increment the count of words
printf("Characters (no spaces): %d\n", characters);
}
fclose(file_object); //close the file object
return 0;
}
The answer is <span> tunnel mode encryption. This</span><span> describes encryption that protects the entire original ip packet's header and payload. A tunnel mode encryption </span><span>protects the internal routing information by encrypting the IP header of the original packet. The original packet is encapsulated by a another set of IP headers. .<span>Additional headers are added to the packet; so the payload MSS is less.</span></span>
Answer:
this program was written in JAVA
Explanation:
import java.util.Scanner;
public class RecursivePalindromeJava
{
public static boolean checkPalindrome(String str)
{
if(str.length() == 0 || str.length() == 1)
return true;
if(str.charAt(0) == str.charAt(str.length() - 1))
return checkPalindrome(str.substring(1, str.length() - 1));
return false;
}
public static void main(String[]args)
{
Scanner sc = new Scanner(System.in);
System.out.println("Please enter a string : ");
String strInput = sc.nextLine();
if(checkPalindrome(strInput))
{
System.out.println(strInput + " is palindrome");
}
else
{
System.out.println(strInput + " not a palindrome");
}
sc.close();
)
)
Answer:
Green computing is also known as green information technology (green IT)
Answer:
Security Policies
Explanation:
As computer systems continue to become complex, it makes it hard for co-operates and big businesses to understand the technology that comes with it. Organizations are concerned with how risks are being handled, managed, and reduced. They therefore, expect security policies to reflect how information should be handled. Better security policies shows a company's commitment to protect data and keep the business healthy.