1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
2 years ago
12

In pseudocode you can use the _________ library function to determine whether a character is an alphabetic letter.

Computers and Technology
1 answer:
Sunny_sXe [5.5K]2 years ago
6 0

Answer:  isalpha()

Explanation:

isalpha() is the library function that is used for algorithm and programs for checking whether the given character is alphabet or any other character such as numbers,etc.It can take a integer value for checking character and then return a integer value.

  • The passed character for checking gets converted into integer form for evaluation.If the returned integer is zero then ,given character is not alphabet otherwise a non- zero return value indicated alphabet.
  • isalpha() Function Prototype :-int isalpha(int argument);

You might be interested in
A process at Host C receiving two incoming UDP segments from two different hosts will know that they originated from two differe
larisa86 [58]

Answer: True

Explanation:

Each connection socket is identified with a four‐

tuple: (source IP address, source port number, destination IP address,

destination port number). When host C receives a segment, it

examines the segment and the operating system will provide the process with the IP address.

7 0
3 years ago
Read 2 more answers
On your Windows server, you’re planning to install a new database application that uses an enormous amount of disk space. You ne
iragen [17]

Answer:

3. ReFS

Explanation:

Only in ReFS include  and others do not have all of the below features

1. Automatic integrity checking and data scrubbing

2. Removal of the need for running chkdsk  

3. Protection against data degradation

4. Built-in handling of hard disk drive failure and redundancy

5.  Integration of RAID functionality

6.  A switch to copy/allocate on write for data and metadata updates

7. Handling of very long paths and filenames

8. Storage virtualization and pooling

4 0
2 years ago
What is an example of constructive criticism for an employee who frequently arrives late?
aleksley [76]
I believe the correct answer is A
5 0
3 years ago
Read 2 more answers
Which of the following image file formats uses lossy file compression?
enyata [817]

Answer:

JPEG

Explanation:

5 0
3 years ago
The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center v
Tasya [4]

Answer: Virtual desktop infrastructure

Explanation:

The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system)  is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.

The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.

All the other options does not involve with this technology so that is why option (D) is correct.

4 0
3 years ago
Other questions:
  • Which of the following tends to be true of silent film acting as opposed to sound film acting?
    7·1 answer
  • Find the reciprocal of 7/2 × 3/5<br>​
    6·1 answer
  • How can the use of new technology in industry benefit the us government
    8·2 answers
  • Which sentence in the passage shows an effective way to protect your document from misuse? Claire has saved her research paper o
    14·1 answer
  • Reply emailing a student who is asking about audio materials​
    6·2 answers
  • Employing the use of a(n) <br> will help you manage a STEM project.
    13·1 answer
  • A small startup company has hired you to harden their new network. Because funds are limited, you have decided to implement a un
    8·1 answer
  • DUE SOON NEED HELP FAST!!
    11·1 answer
  • Name 10 songs of POP SMOKE
    13·1 answer
  • What option can be used by a system administrator to ensure that dynamic updates are made only by known clients when you have a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!