1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Flauer [41]
3 years ago
5

String member function compare compares two strings (or substrings) and returns 0 if:

Computers and Technology
1 answer:
Margarita [4]3 years ago
6 0

Answer:

The correct answer for the given question is option(B). i.e the strings are equal.

Explanation:

String are the collection of characters.In the string compare function if both string are equal then it return 0 value otherwise it return non zero value.

if string 1 is greater then the string 2 then it return 1 . in c language

if string 2 is greater then string 1 then it return -1 in c language.

You might be interested in
What is the best way to prevent the most common cause of network failure?
Goryan [66]
Upgrade routers and servers annually.
8 0
3 years ago
Read 2 more answers
You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
olchik [2.2K]
When you do not understand what another boater intends to do, you are required to communicate this to the boater by sounding five or more short and rapid blasts. A short blast means a blast that takes about one second. The two vessel must stop or slow down until they clearly understand each other intent.
7 0
3 years ago
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a tr
ki77a [65]

Answer:

SSD

Explanation:

8 0
2 years ago
Suppose you have a stack ADT (i.e., an Abstract Data Type that includes operations to maintain a stack. Design a flowchart or su
Whitepunk [10]

Answer:

One approach would be to move all items from stack1 to stack2 (effectively reversing the items), then pop the top item from stack2 and then put them back.

Assume you use stack1 for enqueueing. So enqueue(x) = stack1.push(x).

Dequeueing would be:

- For all items in stack1: pop them from stack1 and push them in stack 2.

- Pop one item from stack2, which will be your dequeue result

- For all items in stack2: pop them from stack2 and push them in stack 1.

Hope it makes sense. I'm sure you can draw a diagram.

5 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
Other questions:
  • Write a copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *thi
    7·1 answer
  • 10 facts about turbines
    11·2 answers
  • What is the exact number of bits in a memory that contains (a) 128k bits?
    9·1 answer
  • What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes incl
    5·1 answer
  • What is the most important trait of the first pilot project in the AI Transformation Playbook?
    10·1 answer
  • Match the items with their respective descriptions. organizes files make files easily searchable keeps track of file creation an
    14·1 answer
  • What is one way a senior employee can mentor a new employee? Give orders about what to do and what not to do Gossip about which
    10·1 answer
  • A unique aspect of Java that allows code compiled on one machine to be executed on a machine of a different hardware platform is
    8·1 answer
  • What practice makes it virtually impossible to figure out the geographic location of a company?
    7·1 answer
  • Write a program that calculates pay for either an hourly paid worker or a salaried worker Hourly paid workers are paid their hou
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!