1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
crimeas [40]
3 years ago
13

What is accomplished by the call to sprintf in the codefragment below?

Computers and Technology
1 answer:
Sphinxa [80]3 years ago
6 0

Answer:

E. None of the above

Explanation:

char ans[20]

int num = 40;

sprintf(ans, "%d to %d", num, num +10);

This code fragment produce an error,because in 1st line of code char ans[20]  ,there is no semicolon after the line.As ans is undeclared ,the ide will produce an error as we use it in

                   sprintf(<u>ans</u>, "%d to %d", num, num +10);

If we put semicolon after the char ans[20] ,then it will not give error but also don't produce an output because for sprintf we should initialize the num and ans as of pointer type.

It is a condition for sprintf and num should be of string type.

<u>C program </u>

#include <stdio.h>

int main()  

{  

char ans[20];  

int num = 40;  

sprintf(ans, "%d to %d", num, num +10);  

return 0;  

}

<u>Output  </u>

No output  

(You can check this code on any ide for confirmation.)

You might be interested in
Steve left his computer switched on in his room and went out to have breakfast. When he returned, he saw that the monitor had be
yanalaym [24]

Answer:

B

Explanation:

5 0
4 years ago
WHAT DOES THE TRANSPORT LAYER USE TO MAKE SURE THAT A MESSAGE IS REASSWMBLED CORRECTLY ON THE RECEIVING DEVICES?
mrs_skeptik [129]
The answer is  sequence  number
6 0
4 years ago
What is the output of the following code:
Zielflug [23.3K]

Answer:

Explanation:

print(list1)

['C++', 'JAVA', 'ASP.PHP']

[2:-2]

Gets 2 position(C++) to -2 position(ASP.PHP), JAVA is in the Middle

print(list2)

[]

Gets middle of C++(nothing)

print(list3)

['Python', 'JAVA', 'MySQL']

Get first, jump 3, get first...

'get', 'any', 'any', 'get', 'any', 'any', 'get', ...

7 0
3 years ago
Purpose In this lab activity, you will be introduced to the concept of enriching data with SPLUNK. This three-hour course is for
Vikki [24]

A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

<h3>What is Enriching Your Data?</h3>

Data enrichment is known to be a kind of an augmentation and it is seen as the act or the process of making better an existing information by the use of a  supplementing missing or any kind of incomplete data.

<h3> What is a Lookup?</h3>

Data Lookup is known to be the method used to make plenty any information based on rules.

Hence, A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

Learn more about SPLUNK from

brainly.com/question/26470051

#SPJ1

8 0
2 years ago
Why are wiki's not secure​
Nookie1986 [14]
Wikipedia is not a reliable source for citations elsewhere on Wikipedia. Because, as a user-generated source, it can be edited by anyone at any time, any information it contains at a particular time could be vandalism
7 0
2 years ago
Other questions:
  • If you wanted to only view the sales of $200,000+ in the table above, which number filter would you select?
    7·1 answer
  • Conceptual note-taking is the act of
    15·1 answer
  • The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time. a) infrastructure
    14·1 answer
  • What is the best data structure to solve the following problem? a) A list needs to be built dynamically. b) Data must be easy to
    11·1 answer
  • In two to three sentences, describe one advanced search strategy and how it is useful.
    13·1 answer
  • The foundation of secure communication on the internet replies on asymmetric encryption, with the use of Public and Private keys
    10·1 answer
  • High level languages are closer to machine language than humans yes or no​
    12·2 answers
  • Question 8 A data analyst is working with a data frame named stores. It has separate columns for city (city) and state (state).
    12·1 answer
  • A _____ is the viewing area for a web page, which is much smaller on a phone than on a traditional desktop.
    7·1 answer
  • Assume that an int variable age has been declared and already given a value. Assume further that the user has just been presente
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!