1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ymorist [56]
3 years ago
6

Replace any alphabetic character with '_' in 2-character string passCode. Ex: If passCode is "9a", output is: 9_

Computers and Technology
1 answer:
oksian1 [2.3K]3 years ago
4 0

Answer:

if(isalpha(passCode[0]))

{

passCode[0] = '_';

}

if(isalpha(passCode[1]))

{

passCode[1] = '_';  

}

         

Explanation:

The first if statement uses isalpha() function which checks if the character passed in this function is an alphabet. If the character stored in 0-th position (which is the first position whose index is 0) of the variable passCode is an alphabet then it is replaced with the '_'

The next if statement checks if the second character in the passCode variable is an alphabet. This means the function isalpha() checks if the character stored in second position (index 1) of the variable passCode is an alphabet then it is replaced with the '_'

The  complete activity with this chunk of code added and the output is attached in a screen shot.

You might be interested in
Use the drop-down menus to complete the statements about using column breaks in word 2016
Naily [24]

Answer: Breaks in the word 2016 what do you mean

Explanation:

7 0
3 years ago
Read 2 more answers
What two statements about IPv6 addresses are true? This task contains the radio buttons and checkboxes for options. The shortcut
Oliga [24]

Answer:

A and C

Explanation:

Option A:

In IPv6 there is a rule to reduce an IPv6 address when there are two or more consecutive segments of zeros just one time. This rule says that you can change the consecutive zeros for “::”  

Here is an example

How to reduce the following IPv6 address?

ff02:0000:0000:0000:0000:0000:0000:d500

Ans: ff02::d500

Example 2:

2001:ed02:0000:0000:cf14:0000:0000:de95

Incorrect Answer -> 2001:ed02::cf14::de95  

Since the rule says that you can apply “::” just one time, you need to do it for a per of zero segments, so the correct answer is:

Correct Answer -> 2001:ed02::cf14:0:0:de95

Or

2001:ed02:0:0:cf14::de95

Option C:

Since in IPv6 there are 2^{128} available addresses which means 340.282.366.920.938.463.463.374.607.431.768.211.456 (too many addresses), there is no need of NAT solution, so each device can have its own IP address by the same interface to have access through the internet if needed. If not, you can block the access through internet by the firewall.

4 0
3 years ago
Which type of computer network ensures high security
Gwar [14]

Answer:

I elieve the answer for this is Juniper Network Firewall

Hope this helps

3 0
3 years ago
Chemical equations of Carbon + water​
Setler79 [48]

Answer:

Aqueous carbon dioxide, CO2 (aq), reacts with water forming carbonic acid, H2CO3 (aq). Carbonic acid may loose protons to form bicarbonate, HCO3- , and carbonate, CO32-. In this case the proton is liberated to the water, decreasing pH. The complex chemical equilibria are described using two acid equilibrium equations.

PLS MARK AS BRAINLIEST

8 0
3 years ago
What does configsys mean​
Delvig [45]

Answer:

Definition - What does CONFIG. ... SYS is a configuration file on DOS systems. It is a text file that contains the settings and commands to load drives in a DOS system. This is a primary configuration file for OS/2 and DOS OS. This file was introduced in DOS and is replaced for 32-bit Windows versions with CONFIG.

Explanation:

6 0
3 years ago
Other questions:
  • Given that two int variables, total and amount, have been declared, write a sequence of statements that: initializes total to 0
    14·1 answer
  • ​_____ was the first commercially successful computer. ​z3 ​eniac ​univac ​colossus
    13·1 answer
  • What is an internal node?
    11·1 answer
  • A byte is made up of 8 bits (binary digits). You have a programming language that uses one byte to represent characters and are
    5·1 answer
  • In information systems, _____ is information from a system that is used to make changes to input or processing activities.
    6·1 answer
  • What is the purpose of a primary key?
    5·1 answer
  • Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
    6·1 answer
  • What do you mean by GIGO (Garbage-In-Garbage-Out) in computer system?​
    6·1 answer
  • Firestick optimizing system storage and applications
    14·1 answer
  • Question 1 (True/False Worth 3 points)
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!