Answer:
Ok so what I can do for this question
#include<stdio.h>
#include<stdlib.h>
int comment1(FILE *fp)
{
char ch;
int count=0;
while(fscanf(fp,"%c",&ch)!=EOF)
{
if(ch=='\n')
{
return count;
}
count++;
}
return count;
}
int comment2(FILE *fp)
{
char ch;
int count=0;
while(fscanf(fp,"%c",&ch)!=EOF)
{
if(ch=='*')
{
fscanf(fp,"%c",&ch);
if(ch=='/')
{
return count;
}
count++;
}
count++;
}
return 0;
}
int main()
{
printf("Enter the file name:");
char s[1000],ch,ch1;
scanf("%s",s);
FILE*fp;
fp = fopen(s,"r");
int count=0;
while(fscanf(fp,"%c",&ch)!=EOF)
{
if(ch=='\"')
{
while(fscanf(fp,"%c",&ch)!=EOF)
{
if(ch=='\"')
{
break;
}
if(ch=='\\')
{
fscanf(fp,"%c",&ch);
}
}
}
else if(ch=='/')
{
fscanf(fp,"%c",&ch);
if(ch=='/')
{
count += comment1(fp);
}
else if(ch=='*')
{
count += comment2(fp);
}
}
}
printf("%d\n",count);
return 0;
}
Answer:
Turing is considered as the father of computer science
A type of situation in which it would make sense to use edge computing is: b. where critical decisions must be made on a split-second basis.
<h3>What is edge computing?</h3>
Edge computing can be defined as a distributed computing system that involves the deployment of computing and storage resources closer to the sources of data, so as to save time and enhance the decision-making process.
This ultimately implies that, a type of situation in which it would make sense to use edge computing is a scenario where critical decisions must be made on a split-second basis.
Read more on edge computing here: brainly.com/question/23858023
#SPJ1
<u>Complete Question:</u>
In which type of situation would it make sense to use edge computing?
a. where data is uploaded to a server at a scheduled time each week
b. where critical decisions must be made on a split-second basis
c. where users are in close proximity to the central data server
d. where there are few or no digital devices to capture
e. i don't know this yet
Answer:
Incomplete Question.
I'll answer this question based on general terms
Explanation:
Two Factor Authentication, abbreviated as 2FA.
It is a type of authentication that requires the presentation of two credentials for access to personal data and information.
The credentials needed for a 2FA are
1. Either of the following; PIN, Password or Pattern
2. Your device or gadget which could be an ATM Card, Mobile Phone
3. Biometrics such as fingerprint, voice input
Number one is often referred to as "Something you know"
Number two is referred to as "Something you have"
Number three is referred to as "Something you are"
The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.