1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ratelena [41]
3 years ago
7

For a typical program, the input is taken using _________ Command-line scanf Files All of the mentioned

Computers and Technology
1 answer:
vfiekz [6]3 years ago
7 0

Answer:

D)All of above

Explanation:

This is the complete question

For a typical program, the input is taken using _________.

A)Files

B)Command-line

C)scanf

D)All of above

E)None of these

computer program could be regarded as a collection of instructions which can be executed using computer to carry out a specific task, and it is written by programmer ,Input in domain of computer could be explained as feeding some data into a program. This input could be in the form of a file as well as command line, with the help of programming set of built-in functions that will help in reading the given input as well as feeding it to the program base on requirement. The scanf do reads the input from the standard input stream( stdin and scans) which is been input based on provided format. It should be noted that For a typical program, the input is taken using Files, Command-line and scanf.

You might be interested in
Were can i watch unexpected free season 3
Vesna [10]

Answer:

Netflix

Explanation:

3 0
3 years ago
In a __________ attack, data that can modify how applications or services operate is downloaded (stored) onto the targeted serve
katovenus [111]

Answer:

The answer is "Cross-Site Coding Persistent"

Explanation:

This coding is also known as an XSS, it is a threat, that converts the files into harmless pages by injecting malware.  

  • This type of scripting is used by the hacker, that passes malware to a different final consumer with a web app, which is typically used by the client end-script.
  • It is very dangerous because the information can be transmitted to a specific repository, which may change by apps and services work.
6 0
3 years ago
Components of a video controller include display generator circuitry, software stored in rom, a video processor, and ____.
Basile [38]
<span>A display monitor. These are more commonly called video card or graphics card now. It's designed to put images on the screen by translating binary into graphics we see on the screen. When they were called video controller, it was integrated into the motherboard itself.</span>
8 0
3 years ago
When you cite your sources and give credit to the authors, you are: (select all that apply)
zimovet [89]

When you cite your sources and give credit to the authors, you are: (select all that apply) is option A: practicing ethical behavior.

<h3>Why is ethical behavior important?</h3>

In order to tell the truth, maintain our word, or assist a stranger in need, we must follow ethical principles. Everyday decisions we make are guided by an ethical framework that helps us avoid unjust results and helps us make decisions that have good effects on the world.

Therefore, Honesty, fairness, and equity in interpersonal, professional, and academic relationships as well as in research and scholarly pursuits are characteristics of ethical behavior. The rights, diversity, and dignity of both individuals and groups of people are respected in ethical behavior.

Learn more about ethical behavior from

brainly.com/question/27962109
#SPJ1

8 0
2 years ago
What is cloud computing,the wireless revolution,and IoT
Crazy boy [7]

Cloud Computing in IoT works as part of a collaboration and is used to store IoT data. The Cloud is a centralised server containing computer resources that can be accessed whenever required. Cloud Computing is an easy travel method for the large data packages generated by the IoT through the Internet.

7 0
2 years ago
Other questions:
  • In evaluating a loop, you find the following statement:
    11·1 answer
  • Peter wants to query to determine the names of the students who scored more than 95 in the internal assessment test which functi
    7·1 answer
  • A certain audio compact disc (cd) contains 783.216 megabytes of digital information. each byte consists of exactly 8 bits. when
    8·1 answer
  • Professional photography is a competitive job field. <br> true <br> false
    12·2 answers
  • Discuss the infrastructure necessary for the Internet of Things and Cloud computing to exist. What unique services does this ena
    7·1 answer
  • An administrator wants to configure hosts to automatically assign IPv6 addresses to themselves by the use of Router Advertisemen
    14·1 answer
  • A pre-design document you can use to create a new project quickly
    5·1 answer
  • An ISA specifies a word size of 8 bytes, byte addressability, and an address space of 256 K; it uses single-word instructions (i
    5·1 answer
  • Jade has to create a workbook for storing information of students participating in the annual state-level sports competition. Th
    5·1 answer
  • * Describe the five components of a<br> computer
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!