1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BlackZzzverrR [31]
3 years ago
6

Look at the following structure declaration.

Computers and Technology
1 answer:
myrzilka [38]3 years ago
7 0

Answer:

B. a tag

Explanation:

In the structure definition given below:

struct Employee

{

string name;

int idNum;  

};

Employee corresponds to the tag of the structure. The tag is used to create additional instances of the structure. For example:

struct Employee e1;

struct Employee e2;

name and idNum are members of the Employee structure and are referenced using the dot notation. e.g.,

struct Employee e1;

e1.idNum=1;

You might be interested in
On five lane roadways, the center lane is designated for __________ and is used by vehicles traveling in both directions.
Alla [95]
Answer : The center lane is designated for left turns

Explanation: 
This lane is used so that drivers would pull into in order to turn left when a clear merge is available. Its main purpose is not to cause traffic jam while waiting for the chance to turn left. It is illegal to use this lane for any other purposes
5 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
A larger gear will produce more torque: true or false
aliina [53]
Power is force multiplied by velocity. The engine power is actually (relatively) constant regardless of the gear. So when people say there is "more power" in a lower gear, it's the common misconception that "more powerful" is "more forceful" but that's only part of the equation.

So if P is constant, then that means if you can combine a large force and a low velocity or a low force and large velocity for the same power.

When you put it in a low gear, you produce a large torque -- or a large force -- and a low velocity.

For example, if you are towing a trailer or trying to climb a very steep grade, you need the force to be large which is why you put it in a low gear. If you are on something slippery like snow or ice, a high gear will keep the force at the wheels low so the tires don't exceed the coefficient of friction and spin.
8 0
3 years ago
Choose the type of attack that is based on entering fake information into a target network domain name server?
SSSSS [86.1K]

Answer:

DNS poisoning

Explanation:

DNS is a server service that verifies or resolves an IP address to a site or domain name. It's services is made available with a dhcp request from a client system, providing the ip address of the DNS server. The DNS server has the records of domain name linked to their individual ip addresses.

When an attacker wants a client to visit his site without knowing the site is not genuine, he gains access to the dns server and changes the information or poisons the entries of the server. So if the client tries to access that site, it takes him to the attackers site. This is called DNS poisoning.

4 0
3 years ago
Jack wants to share the theme he created with others.
blsea [12.9K]
Thmx, Document Themes, Office Themes
8 0
2 years ago
Other questions:
  • Identify the flaws / limitations in the following ConvertToNumber method:
    10·1 answer
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • Greg is the purchasing manager at a jeans-manufacturing company. He knows he could save his company money by using cheaper, thin
    10·1 answer
  • Describe any five GSM PLMN basic services?
    10·1 answer
  • Definition of digital
    9·2 answers
  • One easy way to tell if a cell contains a formula instead of data is to click on the cell and look at the formula bar to
    5·2 answers
  • Kai notices his laptop is running sluggishly, so he wants to check his system resources for any issues. Which utility can he use
    11·2 answers
  • Challenge activity 6.1.3 function call with parameters
    5·1 answer
  • A program that organizes sequences of automated provisioning tasks. A. Application Packager B. Sequence Manager C. Sequence Logg
    14·1 answer
  • What does syntax error mean :-;<br>explain briefly.<br><br>thankyou!
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!