1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
6

A U.S. social security number consists of a string of 9 digits, such as "444422333". Assume that input consists of a sequence of

9-digit social security numbers with no intervening spaces or separators of any kind:111223333444422333123456789987654321...Assume that a char array named ssn suitable for storing a social security number as a C-string has been declared . Use this array to read in 3 successive social security numbers and print each one out on a line by itself
Computers and Technology
2 answers:
harkovskaia [24]3 years ago
6 0

Answer:

767745089

Explanation:

Scrat [10]3 years ago
4 0

Answer:

void printSecurityNumber(char * securityNumber){

char subs[9];

int i = 0;

while(i < 27){

subs[i%9] = securityNumber[i];

i++;

if(i == 8){

printf("%s\n", subs);

}

}

}

Explanation:

I am going to write a for loop for this.

The "break" is at a multiple at position 8(9 digit from position 0 to 8), 17(9 digits from position 0 to 17), 26(9 digits from position 18 to 26).

void printSecurityNumber(char * securityNumber){

char subs[9];

int i = 0;

while(i < 27){

subs[i%9] = securityNumber[i];

i++;

if(i == 8){

printf("%s\n", subs);

}

}

}

You might be interested in
Indicate the order that the three files will be processed <br><br> Please answer
defon
The answer is 10 because I looked it up
6 0
4 years ago
This is your code.
guapka [62]

Answer:

35

Explanation:

List E is a 2 dimensional array. We want index 1 of E, which is B. Now we have an index of that list B, it is index 0 so 35.

7 0
2 years ago
Switched Ethernet, similar to shared Ethernet, must incorporate CSMA/CD to handle data collisions. True False
valentinak56 [21]

Answer:

False

Explanation:

The Carrier-sense multiple access with collision detection (CSMA/CD) technology was used in pioneer Ethernet to allow for local area networking.  Carrier-sensing aids transmission while the collision detection feature recognizes interfering transmissions from other stations and signals a jam. This means that transmission of the frame must temporarily stop until the interfering signal is abated.

The advent of Ethernet Switches resulted in a displacement of the CSMA/CD functionality.

4 0
3 years ago
It takes 2 seconds to read or write one block from/to disk and it also takes 1 second of CPU time to merge one block of records.
Alexxx [7]

Answer:

Part a: For optimal 4-way merging, initiate with one dummy run of size 0 and merge this with the 3 smallest runs. Than merge the result to the remaining 3 runs to get a merged run of length 6000 records.

Part b: The optimal 4-way  merging takes about 249 seconds.

Explanation:

The complete question is missing while searching for the question online, a similar question is found which is solved as below:

Part a

<em>For optimal 4-way merging, we need one dummy run with size 0.</em>

  1. Merge 4 runs with size 0, 500, 800, and 1000 to produce a run with a run length of 2300. The new run length is calculated as follows L_{mrg}=L_0+L_1+L_2+L_3=0+500+800+1000=2300
  2. Merge the run as made in step 1 with the remaining 3 runs bearing length 1000, 1200, 1500. The merged run length is 6000 and is calculated as follows

       L_{merged}=L_{mrg}+L_4+L_5+L_6=2300+1000+1200+1500=6000

<em>The resulting run has length 6000 records</em>.

Part b

<u><em>For step 1</em></u>

Input Output Time

Input Output Time is given as

T_{I.O}=\frac{L_{run}}{Size_{block}} \times Time_{I/O \, per\,  block}

Here

  • L_run is 2300 for step 01
  • Size_block is 100 as given
  • Time_{I/O per block} is 2 sec

So

T_{I.O}=\frac{L_{run}}{Size_{block}} \times Time_{I/O \, per\,  block}\\T_{I.O}=\frac{2300}{100} \times 2 sec\\T_{I.O}=46 sec

So the input/output time is 46 seconds for step 01.

CPU  Time

CPU Time is given as

T_{CPU}=\frac{L_{run}}{Size_{block}} \times Time_{CPU \, per\,  block}

Here

  • L_run is 2300 for step 01
  • Size_block is 100 as given
  • Time_{CPU per block} is 1 sec

So

T_{CPU}=\frac{L_{run}}{Size_{block}} \times Time_{CPU \, per\,  block}\\T_{CPU}=\frac{2300}{100} \times 1 sec\\T_{CPU}=23 sec

So the CPU  time is 23 seconds for step 01.

Total time in step 01

T_{step-01}=T_{I.O}+T_{CPU}\\T_{step-01}=46+23\\T_{step-01}=69 sec\\

Total time in step 01 is 69 seconds.

<u><em>For step 2</em></u>

Input Output Time

Input Output Time is given as

T_{I.O}=\frac{L_{run}}{Size_{block}} \times Time_{I/O \, per\,  block}

Here

  • L_run is 6000 for step 02
  • Size_block is 100 as given
  • Time_{I/O per block} is 2 sec

So

T_{I.O}=\frac{L_{run}}{Size_{block}} \times Time_{I/O \, per\,  block}\\T_{I.O}=\frac{6000}{100} \times 2 sec\\T_{I.O}=120 sec

So the input/output time is 120 seconds for step 02.

CPU  Time

CPU Time is given as

T_{CPU}=\frac{L_{run}}{Size_{block}} \times Time_{CPU \, per\,  block}

Here

  • L_run is 6000 for step 02
  • Size_block is 100 as given
  • Time_{CPU per block} is 1 sec

So

T_{CPU}=\frac{L_{run}}{Size_{block}} \times Time_{CPU \, per\,  block}\\T_{CPU}=\frac{6000}{100} \times 1 sec\\T_{CPU}=60 sec

So the CPU  time is 60 seconds for step 02.

Total time in step 02

T_{step-02}=T_{I.O}+T_{CPU}\\T_{step-02}=120+60\\T_{step-02}=180 sec\\

Total time in step 02 is 180 seconds

Merging Time (Total)

<em>Now  the total time for merging is given as </em>

T_{merge}=T_{step-01}+T_{step-02}\\T_{merge}=69+180\\T_{merge}=249 sec\\

Total time in merging is 249 seconds seconds

5 0
4 years ago
Technology trends continue to increase the processing capabilities of mobile devices. The latest smartphones include up to 8 pro
baherus [9]

Answer:

Two circumstances under which it might be beneficial to offload application functionality from a powerful smartphone are Data Saving and Ransomware/Malware Protection.

Explanation:

Various data like documents, videos,photos etc can be offloaded to a cloud or cloud-let in order to prevent permanent data loss during inevitable as loss of phone, theft etc.  Such saved data can be easily retrieved from cloud storage when new phones are gotten without any loss. Also, in order to prevent total data and application loss by various various attacks, it is advisable that one stores various application and data on cloud servers to enable retrieval easily. Even some cloud servers offer backup security against such virus attacks.

6 0
3 years ago
Other questions:
  • Why does the hp computer not have Bluetooth?
    6·1 answer
  • Why is Copyright important?
    5·1 answer
  • How many bones are in a human body
    7·2 answers
  • Write a statement that computes the square root of a variable called discriminant
    11·1 answer
  • What can be designed to create annoying glitches or destoey data?...
    13·2 answers
  • A(n) ____ network uses a central cable to which all network devices connect.
    13·1 answer
  • unscramble the letters to identify which step of the scientific method each statement repesents why is the sliced cheese in the
    14·1 answer
  • Which value can be entered to cause the following code segment to display the message "That number is acceptable."
    12·1 answer
  • 1. How many bits would you need to address a 2M × 32 memory if:
    8·1 answer
  • How to find the next instance of text formatted in bold
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!