1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
timurjin [86]
3 years ago
14

Write a function called cipher(phrase,shift)that accepts two parameters: a string phrase and an integer shift.The integer shift

can be positive, negative or zero.

Computers and Technology
1 answer:
Aleks [24]3 years ago
7 0

Answer:

Following is given the code according to requirement.

The code is attached as an image so that the indentation is understood by the user. Comments are given inside the code where necessary.

The output of code is also attached as well  in end.

I hope it will help you!

Explanation:

You might be interested in
An online news website relies on in-page advertisements to make money. Their article pages have multiple slots for advertisement
Masja [62]

Answer:

Create a dynamic-sized circularly-linked list to hold a tuple of the adverts and the count. As the program runs, the sum of the counts is used to calculate the fixed advertisement time which is saved in a variable time_slot. Then a loop statement should be used to traversal the linked list continuously until the count sum is exhausted for the day.

Explanation:

A circularly-linked list is a linked list with both ends joined together. With this data structure, the continuous traversal of the list is easier and faster. A conditional statement is used in the algorithm to check and decrement the count of each advert and when all is zero or false, the program ends.

7 0
3 years ago
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
Hoochie [10]

Answer:

Terminal Resource Security

Explanation:

Terminal Resource Security is a type of access control that prevents unwanted user from using a computer that is not in use to access the data and network. It is feature in a software that ensures that the screen of a computer is erased and a user is automatically signed off after a particular length of inactivity. It is used by many organizations.

5 0
3 years ago
PLZ HELP ME ITS URGENT PlZ PLZ PLZ
Lubov Fominskaja [6]

Answer:

#include <stdio.h>

void main()

{

int num;

printf("Input a number :");

scanf("%d", &num);

if (num >= 0)

printf("%d is a positive number \n", num);

else

printf("%d is a negative number \n", num);

}

Explanation:

good luck.

hope it helped you.

pls mark brainleist

8 0
3 years ago
Which topology connects multiple star-topology networks using a bus topology?
Oliga [24]

Answer:

Mesh

Explanation:

Hope it will help

<h2><em>p</em><em>l</em><em>e</em><em>a</em><em>s</em><em>e</em><em> </em><em>m</em><em>a</em><em>r</em><em>k</em><em> </em><em>a</em><em>s</em><em> </em><em>a</em><em> </em><em>b</em><em>r</em><em>a</em><em>i</em><em>n</em><em>l</em><em>i</em><em>s</em><em>t</em><em>s</em></h2>
3 0
3 years ago
You are setting up a new computer. Which devices are considered input devices and which are output devices? In your response,
Vlada [557]
Input devices are things that receive info, such as mice, a keyboard, microphone etc.

Output devices are things that allow the computer to express info, such as a monitor, speaker, headphones, etc
3 0
3 years ago
Other questions:
  • How does a 3D CAD solid model program display the progression of work involved in creating a model?
    5·1 answer
  • If a programming language does not use short-circuit evaluation, what is the output of the following code fragment if the value
    8·1 answer
  • What does an executable file contain? Program instructions written in source code. Program instructions that have been compiled
    15·1 answer
  • The operation:
    8·1 answer
  • Which one of the following is a correct declaration for a method named passAList that has as arguments an array list myList of s
    8·1 answer
  • A software firm is going to develop an application for the automation of various office activities within an organization. In th
    13·1 answer
  • How has information technology made piracy possible
    14·1 answer
  • List the caveats to this analysis and how they affect the research. How does this document define the ""typical game developer""
    7·2 answers
  • How long does it take to send a 19 MiB file from Host A to Host B over a circuit-switched network, assuming:
    14·1 answer
  • Chloe is not pleased with how four images that she has placed on a web page relate to each other. Which search string will be mo
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!