1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
6

Label provides the code that executes if no case label is matched ​

Computers and Technology
1 answer:
Ratling [72]3 years ago
7 0

Answer:

In c/c++ it is <em>default</em>

You might be interested in
Write a Python function that will accept as input three string values from a user. The method will return to the user a concaten
Aleks04 [339]

Answer:

Following are the program in python language

def cat_rev(x,y,z): # function definition  

   x=x[::-1]# reverse the first string  

   y=y[::-1]# reverse the second string  

   z=z[::-1]# reverse the third string  

   z=x+y+z;  #concat the string

   return(z)#return the string

   #main method

s=input("Enter the first string:") #read the first string

r=input("Enter the second string:")#Read the second string  

t=input("Enter the third string:")#Read the third string by user

rev1= cat_rev(s,r ,t ) #function calling

print(rev1)# display reverse string

Output:

Enter the first string:san

Enter the second string:ran

Enter the third string:tan

nasnarnat

Explanation:

Following are the description of program

  • In the main function we read the three value by the user in the "s", "r" and "t" variable respectively.
  • After that call the function cat_rev() by pass the variable s,r and t variable in that function .
  • Control moves to the function definition of the cat_rev() function .In this function we reverse the string one by one and concat the string by using + operator .
  • Finally in the main function we print the reverse of the concat string   .

5 0
3 years ago
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
Why is it useful for students to practice the MLA and APA citation methods?
notka56 [123]

Answer:

Citing or documenting the sources used in your research serves three purposes:

It gives proper credit to the authors of the words or ideas that you incorporated into your paper.

It allows those who are reading your work to locate your sources, in order to learn more about the ideas that you include in your paper.

5 0
3 years ago
Where would you go to add fractions to a document in adobe indesign
prisoha [69]

Just select the fraction text and choose Open Type > Fractions from the Character panel menu.

5 0
3 years ago
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical suppo
dlinn [17]

Answer:

The answer is "The user uses the method for retrieval, which is dependent on the specific app or devices on the operating system".

Explanation:

For retrieving the requested information of the form, with the user device, he uses the retrieval method, which is based upon the specific application or system operating system.

  • In this, the user can resolve the mobile phone application but also show the errors which have been committed to the assistance team of the application manufacturer.
  • Its repair technician requires detailed system data on the way the software responds and also what triggers the mistakes.
4 0
3 years ago
Other questions:
  • To communicate with an expansion card, one part of the ____ bus runs between RAM and the processor; the other part runs between
    13·1 answer
  • Write a function called convert_format which converts the format of a date from mm/dd/yyyy to month name dd, yyyy.
    12·1 answer
  • Manuel has set up his network so that some employees can open and view files but are unable to edit them. Others can open, view,
    10·1 answer
  • Please help, Tech class!!
    14·1 answer
  • During which geologic era was nearly all of Earth's land concentrated into one giant mass called Pangaea?
    6·1 answer
  • Create a list with 5 numbers and find the smallest and largest number in the list and also the sum and product of the numbers in
    9·1 answer
  • Type the correct answer in each box. Spell all words correctly.
    14·2 answers
  • Which phrase suggests feedback?
    13·1 answer
  • Read the ages of three people and find the average. Display the result.
    10·1 answer
  • Yeoo check dis out!!!!!! wait my full vid dont show hol on
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!