1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
evablogger [386]
3 years ago
5

Get the user to enter some text and print it out in reverse order.

Computers and Technology
1 answer:
svetlana [45]3 years ago
3 0

Answer:

strrev in c/c++

Explanation:

You might be interested in
What are the two main things an operating system does?
FromTheMoon [43]
Hello,

A computers operating system manages the software and hard ware on the computer.

Thanks for using brainly.
4 0
4 years ago
Fill in the blanks using A to J below.
Gre4nikov [31]

Answer:

A.software written to meet specific needs of company

B.Related specialized programs combined in a unified package

4 0
3 years ago
Which IDS/IPS detection method uses previously gained connection attributes to match traffic against predetermined profiles
natulia [17]

Answer:

Stateful protocol analysis detection.

Explanation:

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

Generally, the detection methods used by the Intrusion Prevention Systems (IPS) are;

1. Statistical anomaly-based detection.

2. Signature-based detection.

3. Stateful protocol analysis detection.

Stateful protocol analysis detection is an IDS/IPS detection method that uses previously gained connection attributes to match traffic against predetermined profiles.

Basically, these predetermined profiles comprises of benign activities and suspicious activities that have been developed by industry leaders and vendors as abnormal systems or network behaviors.

6 0
3 years ago
Please explain external hashing, B-trees, and traversals. 3-5 sentences per
katrin [286]

Answer: In external hashing the hash table is in disk where each slot of the page table holds multiple entries which refers to pages on the disk organised in the form of buckets.

B-trees are self balancing trees which contains sorted data and allows insertion, deletion, traversals

Traversal is the process of visiting the nodes of the tree data structure.

Explanation:

External hashing is different from internal hashing and it refers to concepts in database management systems. Internal hashing stores only single record maintained in page table format, whereas external hashing holds multiple entries.

B-trees are generalisation of binary trees where it can have more than 2 children.

Traversal of trees helps in insertion, deletion, modification of nodes in tree data structure

4 0
4 years ago
To activate Spelling and Grammar check using the ribbon, navigate first to the _____ tab
ipn [44]
I believe you would click on the Auto Correct Tab
7 0
4 years ago
Read 2 more answers
Other questions:
  • The Tell Me feature also includes access to the _____ feature.
    13·1 answer
  • What does using indirect quotations allow a writer to do?
    7·2 answers
  • This formatting option functions like a space bar. However, instead of moving one space at a time, it allows you to move your te
    6·1 answer
  • How do you change your age on here? I accidentally put that i was 15 but i am only 13. How do I change this?
    12·1 answer
  • Which of the following is most likely to require use of a server, desktop, and industry-specific handheld computer, and is most
    8·1 answer
  • Can someone start me off with a short 2 or 3 paragraphs about the pros and cons of Microsoft Word, and if you can recommend a si
    12·1 answer
  • HELP PLEASE!!!
    7·1 answer
  • This shows you where text will appear as you type.
    14·1 answer
  • You decided to upgrade your PC with a faster processor. To do this, you ordered a new motherboard over the Internet that support
    10·1 answer
  • What are some positive impacts technology has on the environment?​
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!