1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
10

PLEASE HELP I HAVE BEEN STUCK ON THIS QUESTION FOR 5m NOW

Computers and Technology
2 answers:
Papessa [141]3 years ago
8 0
They are personal, formal and informal.
Nataly_w [17]3 years ago
3 0

Answer:

They are personal, formal and informal.

Explanation:

Hope this helps!

You might be interested in
What is up with the bots? They are so annoying.
Yuki888 [10]

Answer:

very very very annoying

6 0
3 years ago
Read 2 more answers
Which of the following features of a network connection between a switch and server is not improved by link aggregation?
Elza [17]

Answer:

The correct answer to the following answer will be Speed.

Explanation:

  • As we all know that computer works at a remarkable speed, no one can match the speed of the computer system.
  • No one having the capacity of solving the computations (complex) fastest than any computer.
  • Its can be the feature by which connection of the network between a server and a switch can't be improved by the collection of link.

The other three options A, C and D can't be the features of network connection as they are not related to the given statement.

7 0
3 years ago
What is redo and undo?​
umka21 [38]

Answer:

Answer in the below

Explanation:

Redo means the previous one and undo means removing it... i am not so sure..

3 0
2 years ago
How do you add binary numbers?
netineya [11]

Set up the problem vertically, and add the digits in the ones place

 Add the digits in the twos place

 Add the digits in the fours place

<span>Keep adding the digits in each place value of the number until you reach your final answer</span>


hope this helps you.


<span>

</span>
7 0
4 years ago
Read 2 more answers
Each of the following code fragments contains a number of security vulnerabilities. For each fragment, identify these security v
Trava [24]

Answer:

Check the explanation

Explanation:

a)

1) int main(int argc, char *argv){

argv has always been an array of pointer whereby each and every element points to the command line argument that is passed to the program.

int main(int argc, char *argv[]) {

2) passwords = fopen(filePath, "r");

argv[0] always holds the name of the program currently running i.e. itself

So you shouldn't even try not to open a executable file for reading. since doing this will not give error but you won't be able to read the file as it is a binary file.

it is god to always check whether the file was opened successfully or not after opening the file. If file was not opened successfully fopen will return NULL.

passwords = fopen(filePath, "r");

if(passwords == NULL)

{

printf(“\n Unable to open file”);

return -1;

}

3) execl(shellPath, "shell", NULL);

Before making a call to execl you should close the open file

close(passwords);

b)

1) char itemID[9];

After creating a char array one should always initialize the array as it may contain some garbage value.

char itemID[9] = “”;

2) scanf("%d", &unitsOrdered);

Since unitOrdered represents the quantity, it should always be non zero and non negative

c)

1) char fullName[MAX_LEN];

MAX_LEN should not be zero or negative as it used to define the size.

If ( MAX_LEN <=0 )

{

return error;

}

else

{

char fullName[MAX_LEN]

}

2) strcpy(fullName, firstName);

Before using the string functions you're expected to always make sure that the pointer that you are passing to the functions should not be NULL i.e. the pointers should always pass to certain memory location.

if (firstName && lastName)

{

strcpy(fullName, firstName);

strcat(fullName, " ");

strcat(fullName, lastName);

return fullName;

}

else

{

return error;

}

5 0
3 years ago
Other questions:
  • Why might a programmer prefer the top-down approach to programming
    7·2 answers
  • Which of the following are advantages of a local area network, as opposed to a wide area network? select three options
    15·1 answer
  • Database designers typically do not add spaces in field names (LName), but can add details in the ________ field of the field pr
    9·1 answer
  • Why is Internet fraud becoming increasingly common?
    5·1 answer
  • What is the name of the formal procedure scientists use to study the world around them?
    14·2 answers
  • What is a set of illustrations displayed in a specific sequence to pre-visualize what your mobile app looks like and how it work
    5·1 answer
  • Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp
    11·1 answer
  • How much data can a flash drive store?​
    13·2 answers
  • Please help 2 lazy to do! easy question
    10·1 answer
  • Artificial intelligence (ai) in perspective is a complex and interdisciplinary field that involves several specialties, includin
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!