1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
10

In a c program, if you see a variable in main declared: float farray[20]; describe what farray is

Computers and Technology
1 answer:
Bas_tet [7]3 years ago
3 0
An array of floats that can hold up to 20.
You might be interested in
Write code that does the following: opens an output file with the filename number_list.txt, uses a loop to write the numbers 1 t
Lady_Fox [76]

Answer:

# create the file

filename = "Testfile.txt"

# for writing, we create the output file:

outPutfile = open(filename, "w")

# Writing numbers from 1-100

for item in range(1,101):

 outPutfile.write((str)(item))

outPutfile.close()

# printing the contents to verify it worked correctly

infile = open(filename, "r") #note the "r" indicates the mode

fileContents = infile.read()

infile.close()

print(fileContents)

Explanation:

  • Define the working file fileName = TestFile
  • Create the output file for writting outPutfile = open(filename, "w")
  • Use a for loop to write numbers from 1-100 to the file outPutfile.write((str)(item))
  • Close the file outPutfile.close()
  • You may open the file read its content and print the contents to verify it worked correctly
8 0
3 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
2 years ago
Interviews should never feel like an_________Instead, they should feel like a________
Rainbow [258]

Answer:

blank 1: interrogation

blank 2: getting to know

Explanation:

4 0
3 years ago
Which of the following statements isNOT true about abstract data types (ADTs)?A list is anexample of an ADT.ADTs hide theimpleme
Fynjy0 [20]

Answer:

Java provide all the ADTs you need,therefore you do not need to create any newones.

This statement is not true.

Explanation:

ADTs are those data types which we use but we didn't know their inner working that is how it is working what is happening inside.It is commonly used for Data Structures for example:- In stack we use push and pop operations to insert and to delete element from a stack respectively but we didn't know how it is happening inside.How the stack is implemented and etc.Java provides most of the ADT's but not all.

5 0
3 years ago
If we were to replicate Dr. Stanley Milgram's obedience study today, do you think the results would be different?
Montano1993 [528]

Answer:

Explanation:

The results would be exactly the same. We have learned little about authority and when to oppose it.

I'll give you an example. Last night I was in a restaurant like Taco Bell or Subway. Across from me was a girl with an ordinary backpack which was all I could see. It was quite common to see that in the University District where I was. I paid no attention until two policemen came in (both over 200 pounds -- she was tall but could not have been more than 130) and began arrest procedures. She started shouting very foul language but otherwise did not resist. They put handcuffs on her wrists which were behind her back. Again she she  used profane language only screaming that they were hurting her. It took the one police officers a moment to find his key and loosen the cuffs, which he did, but she was still uncomfortable and cursing.  

She was silent as they took her out. Nobody questioned the incident at all. Do you think Dr. Millgram would recognize this as an example of his theory? I'm sure he would. Trust me, this was not staged. There was a 3rd officer who drove the girl and one of the 2 arresting officers away.

7 0
3 years ago
Other questions:
  • What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
    6·1 answer
  • The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the:
    12·1 answer
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • Why does brainly keep saying “oops... something went wrong! Try again”
    7·2 answers
  • In addition to using comments and track changes, you can also use the comparison feature for reviewing documents. In this activi
    11·1 answer
  • Grace is the editor of her school newspaper. Which feature of a word processing program would she use to make her changes visibl
    7·2 answers
  • Please what do you guys think about this ?
    10·2 answers
  • Using C, Write a program that reads a series of strings from standard input and prints only those strings beginning with the let
    8·1 answer
  • Python Coding:
    15·1 answer
  • What is not recyclable in a<br> hybrid car<br> hydrogen car<br> petrol car
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!