1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dalvyx [7]
3 years ago
7

In memory, C++ automatically places a ________ at the end of string literals.

Computers and Technology
1 answer:
solong [7]3 years ago
6 0

Answer:

c.Null Terminator.

Explanation:

in memory C++ automatically places the null terminator also called null pointer at the end of the string.For example:-

#include<iostream>

using namespace std;

int main()

{

    char s[200];

   s="every thing is great";

   int i=0;

   while(s[i]!='\0')

  {

      cout<<s[i];

i++;

  }

return 0;

}

We have taken a string and stored "every thing is great" in it after the next position of the character t in the string there will be a null character.Which C++ automatically places at the end.That's why we are running a loop till the  character in the string is not '\0' null character

You might be interested in
Please i need your help
motikmotik
Hello!

The answer would be:

C. non-linear navigation.

Explanation: Non-linear navigation lets a user navigate through material without them having to follow a strict order.

I hope that this helps you!
3 0
2 years ago
3. Do some Internet research on the use of VLANs in hospitals. Summarize the benefits of using VLANs in hospitals and identify e
motikmotik

VLAN refers to Virtual Local Area Network. It is a subnetwork that can group together collection of devices on separate physical Local Area Networks. VLANs allow network administrators to group hosts together even if the hosts are not directly connected to the same network switch.

Considering the large number of departments in hospitals, with each departments having functions different from the others, Virtual LANs allows various users(the departments) to be grouped together according to their networking needs, regardless of their actual physical locations. Subdividing the LAN into smaller segments, or VLANs, increases overall reliability, security, and performance, and makes the network easier to maintain.

Because of the largeness of St. Luke's hospitals and their mission of delivering highly reliable and feature-rich advanced network solutions, virtual LAN will help to provide a resilient and scalable network solution within the hospital's budget.

St. Luke should implement virtual LAN that can produce a higher bandwidth with lower-cost, a longer-term model based on servers, networking products and homogenous network components to deliver centralized management of computing across the hospital network.

5 0
4 years ago
Read 2 more answers
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
ankoles [38]

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

6 0
3 years ago
In what way(s) did the password you tried to use not meet the password policy requirements?
Gre4nikov [31]
Depends on the organization. Password policies differ between each organization. Generally on a mainstream point of view. Passwords should generally be complex. If your passcode is too short. This could pose a risk to your account and the companies data could be at risk.

Broad range of possible pass code rules that may be blocked.

7 character limit
Capital letter and/or number figure
No easy consecutive digit or character: e.g abcd1234
8 0
3 years ago
What level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized
Oduvanchick [21]

The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

<h3>What is a Subapplicant?</h3>

Subapplicant is known to be a term that connote a State agency, or a community, that is said to be submitting a subapplication to the applicant and this is one that is often used as a source of aid under the FMA program.

Note that Upon grant award, the subapplicant is seen as the subrecipient and thus, The view/print privileges is the level of access can a subapplication owner provide to another egrants user in the same organization who has been authorized view/print access for other subapplications.

Learn more about subapplication from

brainly.com/question/14400492

#SPJ1

8 0
2 years ago
Other questions:
  • Cover photos have a prominent location in your social media profiles, so you should use this space strategically – for example,
    14·1 answer
  • Most licensing agencies offer an orientation meeting for applicants who want to obtain licensing for a child care facility or a
    12·2 answers
  • Which of the following is an example of constructive criticism for a friend who speaks too softly?
    13·2 answers
  • Passwords are usually alphanumeric and usually cannot contain spaces or ________.
    10·2 answers
  • Write a statement that declares a prototype for a function printArray, which has two parameters. The first parameter is an array
    5·1 answer
  • You can use your student ID card to get discounts in all of the following except
    6·2 answers
  • Im going to find where u live and bring a doctor to give u a tetnus shot
    8·1 answer
  • The following method is intended to return true if and only if the parameter val is a multiple of 4 but is not a multiple of 100
    7·1 answer
  • Complete the following statements by choosing the correct answer from the drop-down menus.
    6·1 answer
  • Your son is complaining that his smartphone is broken. He tells you that he cannot connect to the internet, nor can he make or r
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!