1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
12

NO LINKS<br />Write a C program called velocity.c to do the following activities.<br />• The parent process should r

ead an array (size 6) of double (frequency (1)) from the user<br />and creates a pipe to do the inter-process communication and then creates a child process<br />(Child-1).<br />• Child-1 will calculate the velocity (V) when the wavelength() is 100 m (constant) and write<br />answers to the pipe. Use the formula is given below;<br />V = fa<br />(V=Velocity, f=frequency, 1=wavelength)<br />. Then the Child-1 creates a new child process (Child-2) and the Child-2 should read values<br />from the pipe and print them to the screen.​
Computers and Technology
1 answer:
algol [13]3 years ago
3 0

Answer:

uhm.....im confused a bit here

You might be interested in
Samuel loves playing the violin, but he feels embarrassed after a classmate posts a video on a social networking site making fun
Ksenya-84 [330]

Answer:

Number 1 would be the answer and most safest one to choose.

4 0
4 years ago
Read 2 more answers
What is a quick way to determine if a site might contain reliable information? looking at the title of the webpage reading the f
kvasek [131]

The answer is checking the URL.  

Looking at the URL or the web address of the website will help you determine  whether the site contains reliable and credible information or not. Domain names like .edu and .gov are usually trusted sites. What you are looking for are sites with trusted institutions that have a proven record of integrity and reliability. Domain type should always match the content. For example, .edu should have educational material.  By checking the URL, You’ll also be able to establish the person’s name or the agency that published the article.  


8 0
4 years ago
Read 2 more answers
The first step in the information processing cycle is _____, which involves entering data into the computer.
Dmitry [639]

Answer:

INPUT

Explanation:

Information Processing Cycle is defined as the series of stages followed in processing information. Those stages include:

  • Input
  • Processing
  • Storage
  • Output

Input involve entering the data/information into the computer

Processing involve the computer performing some computation on the data

Storage involve saving the data and/or result to the any medium for future use.

Output involve displaying or presenting the results to the user.

4 0
3 years ago
A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryptio
tino4ka555 [31]

Answer:

A) virus signature

Explanation:

Antivirus databases contain what are called signatures, a virus signature is a continuous sequence of bytes that is common for a certain malware sample.

--

Encryption is a way of scrambling data so that only authorized parties can understand the information.

7 0
2 years ago
Which view shows how the document will look when printed?
DIA [1.3K]
Please provide photos for your question.
7 0
4 years ago
Other questions:
  • PLS HELP ASAP! WILL GIVE BRAINLIEST!
    14·1 answer
  • Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
    12·1 answer
  • Give a recursive algorithm for finding the sum of the<br> first n odd positive integers.
    8·1 answer
  • Before entering a road from an alley or driveway, you must:Flash your high beam headlights 
    13·1 answer
  • If you wish to edit a data source in a document, you can make modifications when you select the data sources or _____.
    7·2 answers
  • A common type of non-volatile memory is _____.
    12·1 answer
  • A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
    7·1 answer
  • Wireshark is an example of what type of utility? A) Packet sniffer B) Port scanner C) Vulnerability scanner D) Content filter
    11·1 answer
  • Explain why the local disc of a computer start from C and not A​
    6·1 answer
  • Give three general reasons for the importance of computer networking.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!