run this code and show result #include #include int main() { char i; int y = 0; while(1) { if(!(kbhit())) { y = 0; printf("\nkey is not pressed"); //do what you want } else { printf("\nkey pressed (execution pause), press again to resume"); i = getch(); if (i == 'p') { printf("\nInformation or action to be performed when 'p' is pressed"); } y = 1; } if(y == 1) { getch(); } } return 0; }
Q: The distribution of keys may be done in a myriad of different ways. What is the most amazing thing,…
A: Introduction: Secret key distribution used to be challenging since it called for in-person meetings,…
Q: Why are the main differences between creating network programmes and other software important?
A: Answer: We need to explain the what are the difference between the creating network programms and…
Q: Examine security management strategies and their ideas
A: Introduction Many businesses choose to hire a systems administrator responsible for security…
Q: How many different districts exist in the address table? Display: number of unique distinct names…
A: Introduction: SQL (Structured Query Language) is a programming language used for managing and…
Q: Must use python language and file i/o system to solve the question. Write the functions add(),…
A: Program Approach :
Q: What makes RSA better than other symmetric encryption algorithms?
A: RSA is actually an asymmetric encryption algorithm, which means it uses two keys, a public key and a…
Q: We'll discuss descriptive model characteristics and behaviours below.
A: DESCRIPTIVE MODEL - Descriptive research is a form of research methodology that describes all of the…
Q: Provide four page replacement techniques. A side-by-side comparison?
A: Page replacement is a technique used in operating systems to manage the allocation of memory in a…
Q: Learn how the spread of wireless networks is influencing developing nations. While constructing…
A: Wireless networks link network nodes. wirelessly. Cell phones, WLANs, sensor networks, and…
Q: In what ways does your company try to anticipate potential security breaches in its network…
A: Preventing network vulnerabilities: Firewalls should be utilised internally and externally.…
Q: This includes DNS lookups, authoritative and root servers, and iterative and non-iterative search…
A: DNS is commonly referred to as the internet's phone book. Formerly, you would look up a business's…
Q: ses data center and cloud IT SEC
A: Introduction: The choice between an on-premises data centre and a private cloud is determined by who…
Q: justify a work breakdown structure Is your favorite SDLC needed to lead a typical software project?
A: Introduction: We must explore the significance of the work breakdown structure in this section. Is…
Q: How do traditional on-premises data centers and cloud IT SECURITY installations compare?
A: Introduction: Computers and all that may be done with them are included in information technology…
Q: Successful system development initiatives have used the Software Development Life Cycle (SDLC).…
A: Given: Agile is the greatest SDLC technique and one of the SDLCs that is used the most often in the…
Q: Is it possible to receive two distinct types of services by using web-based software? So, how does…
A: Cloud computing:- Cloud computing is a type of computing that uses a network of remote servers…
Q: The term "computer mouse" may also be written as "mouses," which is the plural form.
A: On a computer: The mouse is a little, movable object that you may use to control a number of…
Q: Successful system development initiatives have used the Software Development Life Cycle (SDLC).…
A: Agile is the greatest SDLC technique and one of the most extensively used SDLCs in the IT industry,…
Q: Awareness of existing cybersecurity defensive measures may assist a corporation select risk…
A: Explanation Most firms no longer operate under the idea that there is an information security…
Q: Describe technique Changing the look of shapes using animation in After Effects using a technique…
A: Answer: We need to explain the technique changing the loop of shape using the animation. so we will…
Q: Statistics are often calculated with varying amounts of input data. Write a program that takes any…
A: Algorithm: Step 1 Start. Step 2 Get input from the user in the form of a space-separated list of…
Q: This section covers ATM traffic management capabilities to reduce congestion. Each function should…
A: ATM (Asynchronous Transfer Mode) is a telecommunications technology that is used for high-speed…
Q: You can declare two variables with the same name as long as___a. they appear within the same…
A: Avoiding name conflicts between variables is crucial while creating code. Two variables with the…
Q: What distinguishes on-premises data center and cloud IT SECURITY implementations?
A: Introduction: The choice between an on-premises data centre and a private cloud is determined by who…
Q: What distinguishes logical and physical data flow diagrams? Data warehouse metadata is crucial.
A: The response: DFD based on logic: focuses on issues in business. Meetings. It provides a list of…
Q: How important are sourcing team processes and procedures?
A: Sourcing Group: The procurement process encompasses all operations revolving around the discovery…
Q: How can you protect your computer from power surges, and what other precautions can you take to make…
A: Protecting your computer from power surges is important to prevent damage to its components and…
Q: Which strategy, one that works from the bottom up or one that works from the top down, is more…
A: Introduction: Software development is the process of designing, coding, testing, and maintaining…
Q: Compare and contrast two security architecture models.
A: Definition: Security architecture is described by the International Organization for Standardization…
Q: Software development uses several models, each with different relevance based on the application.…
A: Software development: Software development employs a variety of models, each of which has a unique…
Q: Which two components on a computer's motherboard are the most vital to its operation?
A: Computer's motherboard: A computer's motherboard is the main printed circuit board in a computer. It…
Q: Certain data stores will only utilise the outside tracks of a magnetic disk, leaving the inside…
A: Introduction: In this answer, we explore the potential upsides of utilizing only the outside tracks…
Q: The result of Java expression 5*7>3*(5+2) && 3*5-435&&9
A: programming Language:- A formal language called a programming language is created to convey…
Q: Mobile technology's various issues make adoption difficult. How much can you save over web-based…
A: An introduction in short Using mobile technology involves overcoming several challenges. Mobile…
Q: Methods differ from SDLC. Explain the software development life cycle (SDLC) and software…
A: The answer to the question is given below:
Q: Explain the many different search tactics, as well as the time constraints each one places on your…
A: Introduction: The term "search tactics" is commonly used to describe the numerous strategies people…
Q: SHIFTING THE ELEMENTS IN AN ARRAY Using a loop and indexed addressing, write code that rotates the…
A: This SHIFTING OF ELEMENTS IN AN ARRAY BY USING ASSEMBLY LANGUAGE is explained in two steps Step 1:…
Q: A flowchart is a visual representation of the process. Why is it of such great importance?
A: What is Flowchart ? A flowchart is a diagram that shows how a procedure or program works. To…
Q: "Computer mice"-what noun ending?
A: To move the cursor or pointer on a computer screen, a computer mouse is a necessary input device. It…
Q: How are several technical methods used in the process of identifying network intrusions?
A: A network intrusion is any illegal activity carried out on a digital network. Network intrusion…
Q: How does the internet affect your impaired life? Do you have any disability-friendly technological…
A: Start: The internet helps those who are disabled. On the internet, they have the following…
Q: For what purpose does the CPU exist, and what does it do specifically? Regarding this matter, what…
A: A computer system is a collection of computers, related hardware, and related software. A…
Q: Discuss company continuity, standards, and processes with your teammates. Name one problem that…
A: Given: Organizational policies provide direction, consistency, responsibility, accountability, and…
Q: How has networking evolved with each new generation of technology, and what are the pros and cons of…
A: Networking Technology: Networking technology is the use of technologies for the purpose of…
Q: Examine digital platform advances throughout time. How have your country's most popular websites and…
A: Digital platforms have undergone significant advances throughout the years, evolving from simple…
Q: Provide an explanation of the primary distinctions that exist between a relational database and a…
A: In this question we have to understand and explanation of the primary distinctions that exist…
Q: Is the Internet significantly different from landlines?
A: The following are the key distinctions between a phone system and the Internet:
Q: USE SIMPLE PYTHON Multithreading to perform parallel array summing. 1) Basic version with two…
A: Given values in an array of 1000 random integers (please program to generate 1000 random integers to…
Q: Considering the current state of affairs, why is it so important for people to be able to use…
A: Spreadsheets are an essential tool for data analysis, financial modeling, and project management,…
Q: Organizations confront several challenges while moving to the cloud. Which hurdles matter most? What…
A: Cloud computing allows users to use non-user-controlled computer system resources like cloud storage…
Step by step
Solved in 2 steps
- int func(int a, int b) { return (a#include void main () { int a=5,b=10,c=1; if (a && b>c) { printf("cquestionbank"); } else{ break; } }#includecstdio.h> int x=10; void func1() 7 printf("x=%d\n", x); return; 8 10 int func2(int a, int b) 15 return a+b; 16 18 19 ... func3(...) 20 21 .. return ... int main() 27 { int x-1, y=2; func1(); 28 29 30 int z=func2(x, y); printf("z-%d\n", z); 31 34 Figure 2. C Program for Q2 What is the output after execution of line 29 and 32? a. b. func3() in line 19 to 23 is incomplete. Write the function, func30 to compute and print the volume of cuboid with length x, width y and height z. c. Complete line 33 to call func3() that you created in part (b).//Assignment 06 */public static void main[](String[] args) { String pass= "ICS 111"; System.out.printIn(valPassword(pass));} /* public static boolean valPassword(String password){ if(password.length() > 6) { if(checkPass(password) { return true; } else { return false; } }else System.out.print("Too small"); return false;} public static boolean checkPass (String password){ boolean hasNum=false; boolean hasCap = false; boolean hasLow = false; char c; for(int i = 0; i < password.length(); i++) { c = password.charAt(1); if(Character.isDigit(c)); { hasNum = true; } else if(Character.isUpperCase(c)) { hasCap = true; } else if(Character.isLowerCase(c)) { hasLow = true; } } return true; { return false; } }#include using namespace std; const int y = 1; int main () { int static y = 2; int i = 3, j = 4, m = 5, n = 6; %3D int a = [] (int x, int i = 1) { return x * i; } (y, 3) ; %3D int b = [=] (int x) { return [=] (int b) { return b + j; } (x) % 7; } (a); int c = [=] (int x) mutable ->int { m = 6; return [6] (int j) mutable { y = a * b; return y / j; } (x) -m; } (b) ; cout << a << endl; cout << b << endl; cout << c << endl; cout << m << endl; cout << y < endl; return 0; This program outputs 5 lines. What are they? Please explain your work and your answer.#include #include #include int main() { int i, j; printf("Columns | JIn"); for (i = 1; i< 4; ++i) { printf("Outer %6d\n", i); for (j = 0; j< i; ++j) { printf(" Inner%10d\n", j); } } /* heading of outer for loop */ /* heading of inner loop */ %3D return (0); } Create a new code modifying it to use "while loop" instead of the "for loop"#include #include #include #define SIZE 5 int nums [SIZE] = [5,0,6,1,2); int main() { int i; pid_t pid; pid= fork(); if (pid == 0) { for (i = 0; i 0) { wait (NULL); } for (i = 0; i < SIZE; i++) printf("PARENT: %d\n", nums [i] + 1); /* LINE Y */ return 0; From the above-given program, please state what will be the output at lines X and Y. Explanation in detail required for output at both lines X and Y.be recor #include #include minutes #include limit on int func(int, int, int, int); main(){ srand(time(NULL)); int a, b, c, fNum; printf("Choose three different numbers between 0-39:"); scanf ("%d%d%d", &a, &b, &c); fNum = func (a, b, c, 25); printf("\nThe result: %d", fNum); } int func (int ul, int u2, int u3, int iter){ srand (time (NULL)); int n1=0, i=0, count=0; for (;i#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…#include <stdio.h>int main(){int d;int s[20],i, r, p, lg=0,m;char c;printf("Enter number of salesman(max 20): ");scanf("%d", &d);for(i=0; i<d; i++){ printf("\n salesman %d sales: ");scanf("%d", &s[i]);}for(i=0; i<d; i++){for(r=i+1; j<d; r++){if(s[i] > s[r]){p= s[i];s[i] = s[r];s[j] = p;}}}printf("\nsalesman lowest to highest: ");for(i=0; i<d; i++){printf("%d\t", s[i]);}for(i=0;i<m;i++){printf("\n highest sales: %d ",lg);if(lg<=s[i])lg=s[i];break;}getch();} >>> the upper part output should be like this enter number of salesman (max 20): 5 salesman 1 500 salesman 2 300 salesman 3 1000 salesman 4 200 salesman 5 1000 in the lower part the lowest to highest the output should become like this salesman 4 200 salesman 2 300 salesman 1 500 salesman 3 1000 salesman 5 1000 highest total sales : 2000#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…SEE MORE QUESTIONSRecommended textbooks for youDatabase System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSONC How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag…Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill EducationDatabase System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSONC How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag…Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education