1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
9

Is it true that if the user log out the computer will turn off automatically​

Computers and Technology
2 answers:
sergiy2304 [10]3 years ago
8 0
Yes that is a true statement
xxMikexx [17]3 years ago
7 0

Answer:

Yes it is true

Explanation:

You might be interested in
Real GDP is found by removing the effects of inflation. How is this done mathematically?
tia_tia [17]
<span>B. By dividing Real GDP by (100/100-inflation rate).</span>
3 0
3 years ago
Which domain suffixes do businesses that sell products and services commonly use?
sineoko [7]
I’m having a hard time understanding your question
8 0
4 years ago
Read 2 more answers
3. Write a program that inputs 4 hexadecimal digits as strings (example 7F), converts the string digits to a long – use strtol(i
never [62]

Answer:

#include <stdio.h>

#include <stdlib.h>

int main()

{

char num1[20],num2[20],num3[20],num4[20];

//Checks where the conversion of string to long stops and is required by strtol

char *ptr;

//Stores the converted number string into long.

long result_num1,result_num2,result_num3,result_num4;

//Prompt to enter all the four hexadecimal numbers.

printf("Enter the first hexadecimal number: ");

scanf("%s",num1);

printf("Enter the second hexadecimal number: ");

scanf("%s",num2);

printf("Enter the third hexadecimal number: ");

scanf("%s",num3);

printf("Enter the fourth hexadecimal number: ");

scanf("%s",num4);

//Converting the hexadecimal numbers into long using strtol() function with base 16 for hexadecimal.

result_num1 = strtol(num1,&ptr,16);

result_num2 = strtol(num2,&ptr,16);

result_num3 = strtol(num3,&ptr,16);

result_num4 = strtol(num4,&ptr,16);

//Casting the long to unsigned chars.

unsigned char numb1 = (unsigned char)result_num1;

unsigned char numb2 = (unsigned char)result_num2;

unsigned char numb3 = (unsigned char)result_num3;

unsigned char numb4 = (unsigned char)result_num4;

//Applying the boolean operation on unsigned chars and storing the resultant value in result.

unsigned char result = ((numb1&numb2)|numb3)^numb4;

//Printing the result in capital hex ("%X" take care of this).

printf("%X",result);

return 0;

}

Code OUTPUT

Enter the first hexadecimal number: 1 Enter the second hexadecimal number:2

Enter the third hexadecimal number: 3 Enter the fourth hexadecimal number: 4 Resultant Value: 7 Process returned o (0×0) execution time : 3.076 s

Press any key to continue

4 0
3 years ago
Blogs are typically written by large companies or organizations as a way to express formal, technical, or scholarly information
Vikentia [17]

This is not really true, so is this supposed to be like a true or false question? If so then I would say this is false, because a lot of smaller people post on blogs it is not all typically large companies or organizations.

5 0
3 years ago
with the current computer development, explain 5th areas where computer is applied for the social economic dwvelopment in societ
AleksandrR [38]

Explanation:

just want points tbh but have a good day

7 0
3 years ago
Other questions:
  • What is the difference between deta security and privecy ?
    12·2 answers
  • Create a class called Home that contains 4 pieces of information as instance variables: county (datatype string), street (dataty
    5·1 answer
  • C programming: loading a dictionary into a trie data structure. Why am I segfaulting?
    8·1 answer
  • Instructions:Select the correct answer.
    9·1 answer
  • Jade has to present a paper on the basic architecture of the Princeton microcomputer architecture model. Which option will he hi
    5·1 answer
  • Mark is looking for a position in the IT field that best matches his qualifications. He has an associate degree in the field and
    6·1 answer
  • Write a program to assign distinct number between 1 and 200 into an int array of 100 elements in ascending order (you may reuse
    6·1 answer
  • An important strategy in survey design involves the use of terms, phrases, and words that are known to both the PI team and resp
    9·1 answer
  • Which of the following is a potential hazard
    12·2 answers
  • I have a question. This question will probably be deleted, but why do moderators keep deleting my answers when they are legitima
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!