1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
4 years ago
9

Which statement is false? Select one: a. Function printf does not care how large the array it is printing is. b. Function scanf

reads characters into memory from the keyboard until the first input whitespace character is encountered.
Computers and Technology
1 answer:
dusya [7]4 years ago
6 0

Answer:

Option A

Explanation:

Because each function has specific amount of space allocated by default on the stack, so it cares about the length of the array being printed by it. By default the space is up to 100 kb but this size can be increased by setting it manually.

Option B is correct answer because scanf takes input from user until first space is hit.

You might be interested in
he wants to customize the operating system to meet his needs. what types of tools should he use, and what can he do with each?
Dennis_Churaev [7]

Answer:

remastering iso image

Explanation:

you  can add the gui, default installed program, etc

3 0
3 years ago
Discuss the following IT security policies and the level of protection each policy provides in the context of your assigned scen
Oksi-84 [34.3K]

Answer:

IT security policy identifies the methods for all individuals and using the organization's assets and resources. The main objective of Its security is to integrate the system information used by the organization.

Mature security policies need the following procedures.

  • Acceptable use policies
  • Access control policy
  • Change management policy
  • Incident Response
  • Information Security
  • Remote Access
  • Email Policy
  • Business Continuity Plan

Explanation:

Internet use policy

Internet use policy provides the employee with rules about the proper use of company equipment, network, and internet. The system can be tailored to a specific organization. The employee has some responsibility, including e-mail. The employee is responsible that the internet is used efficiently.

External device use policy

An employee using an external device and related software for data access will use secure data management procedures. A strong password must protect all external devices.Employee discloses their passwords to anyone would harm them.

Employee Identity (ID) policy

Employee identity policy indicates that you are an employee in the company.ID cards are issued to the employee. It also provides proper access to the employee to a company.

Computer use policy

Computer use policy is a way to emphasize the employee that a computer is a tool and should be used in manner. Using this policy, the employee monitors the network by three exceptions.

5 0
3 years ago
Data redundancy should be avoided because it wastes storage space and might cause inconsistencies within the database. _________
Ivanshal [37]

The answer is true. Data redundancies should be avoided, because redundancy of information or encoded data, may cause inconsistencies within the database itself and the system and also redundant information can consume a lot of storage space and will just waste it, which is why it is important to avoid data redundancy.

5 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
tensa zangetsu [6.8K]

This term could apply to a router.

4 0
3 years ago
Which networking devices forward incoming data between computer networks
Gnoma [55]

Answer: C,D

Explanation:

Wireless routers are commonly found in homes -- they're the hardware devices that Internet service providers use to connect you to their cable or xDSL Internet network. A wireless router, also called a Wi-Fi router, combines the networking functions of a wireless access point and a router.

6 0
3 years ago
Read 2 more answers
Other questions:
  • To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuat
    8·2 answers
  • Can someone explain a cylinder
    7·1 answer
  • Which version of Windows was considered an operating environment rather than an operating system? Windows 1.0 Windows 3.0 Window
    9·1 answer
  • Say you write a program that makes use of the Random class, but you fail to include an import statement for java.util.Random (or
    10·1 answer
  • All presentations should have this. A. a clear central message. B. a design template. C. at least seven slides. D. special effec
    10·2 answers
  • My computer just fried anybody know why it did that?
    14·2 answers
  • How many questions do you need unlock messages
    6·1 answer
  • At Chicago Cubs games, residents across the street from Wrigley Field can watch the game from their apartment windows. Many of t
    14·1 answer
  • The Federal Trade Commission FIP principle of Notice/Awareness states that
    5·1 answer
  • T.L.E
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!