run this code and show result #include #include int main() { char i; int y = 0; while(1) { if(!(kbhit())) { y = 0; printf("\nkey is not pressed"); //do what you want } else { printf("\nkey pressed (execution pause), press again to resume"); i = getch(); if (i == 'p') { printf("\nInformation or action to be performed when 'p' is pressed"); } y = 1; } if(y == 1) { getch(); } } return 0; }
Q: The distribution of keys may be done in a myriad of different ways. What is the most amazing thing,…
A: Introduction: Secret key distribution used to be challenging since it called for in-person meetings,…
Q: Why are the main differences between creating network programmes and other software important?
A: Answer: We need to explain the what are the difference between the creating network programms and…
Q: Examine security management strategies and their ideas
A: Introduction Many businesses choose to hire a systems administrator responsible for security…
Q: How many different districts exist in the address table? Display: number of unique distinct names…
A: Introduction: SQL (Structured Query Language) is a programming language used for managing and…
Q: Must use python language and file i/o system to solve the question. Write the functions add(),…
A: Program Approach :
Q: What makes RSA better than other symmetric encryption algorithms?
A: RSA is actually an asymmetric encryption algorithm, which means it uses two keys, a public key and a…
Q: We'll discuss descriptive model characteristics and behaviours below.
A: DESCRIPTIVE MODEL - Descriptive research is a form of research methodology that describes all of the…
Q: Provide four page replacement techniques. A side-by-side comparison?
A: Page replacement is a technique used in operating systems to manage the allocation of memory in a…
Q: Learn how the spread of wireless networks is influencing developing nations. While constructing…
A: Wireless networks link network nodes. wirelessly. Cell phones, WLANs, sensor networks, and…
Q: In what ways does your company try to anticipate potential security breaches in its network…
A: Preventing network vulnerabilities: Firewalls should be utilised internally and externally.…
Q: This includes DNS lookups, authoritative and root servers, and iterative and non-iterative search…
A: DNS is commonly referred to as the internet's phone book. Formerly, you would look up a business's…
Q: ses data center and cloud IT SEC
A: Introduction: The choice between an on-premises data centre and a private cloud is determined by who…
Q: justify a work breakdown structure Is your favorite SDLC needed to lead a typical software project?
A: Introduction: We must explore the significance of the work breakdown structure in this section. Is…
Q: How do traditional on-premises data centers and cloud IT SECURITY installations compare?
A: Introduction: Computers and all that may be done with them are included in information technology…
Q: Successful system development initiatives have used the Software Development Life Cycle (SDLC).…
A: Given: Agile is the greatest SDLC technique and one of the SDLCs that is used the most often in the…
Q: Is it possible to receive two distinct types of services by using web-based software? So, how does…
A: Cloud computing:- Cloud computing is a type of computing that uses a network of remote servers…
Q: The term "computer mouse" may also be written as "mouses," which is the plural form.
A: On a computer: The mouse is a little, movable object that you may use to control a number of…
Q: Successful system development initiatives have used the Software Development Life Cycle (SDLC).…
A: Agile is the greatest SDLC technique and one of the most extensively used SDLCs in the IT industry,…
Q: Awareness of existing cybersecurity defensive measures may assist a corporation select risk…
A: Explanation Most firms no longer operate under the idea that there is an information security…
Q: Describe technique Changing the look of shapes using animation in After Effects using a technique…
A: Answer: We need to explain the technique changing the loop of shape using the animation. so we will…
Q: Statistics are often calculated with varying amounts of input data. Write a program that takes any…
A: Algorithm: Step 1 Start. Step 2 Get input from the user in the form of a space-separated list of…
Q: This section covers ATM traffic management capabilities to reduce congestion. Each function should…
A: ATM (Asynchronous Transfer Mode) is a telecommunications technology that is used for high-speed…
Q: You can declare two variables with the same name as long as___a. they appear within the same…
A: Avoiding name conflicts between variables is crucial while creating code. Two variables with the…
Q: What distinguishes on-premises data center and cloud IT SECURITY implementations?
A: Introduction: The choice between an on-premises data centre and a private cloud is determined by who…
Q: What distinguishes logical and physical data flow diagrams? Data warehouse metadata is crucial.
A: The response: DFD based on logic: focuses on issues in business. Meetings. It provides a list of…
Q: How important are sourcing team processes and procedures?
A: Sourcing Group: The procurement process encompasses all operations revolving around the discovery…
Q: How can you protect your computer from power surges, and what other precautions can you take to make…
A: Protecting your computer from power surges is important to prevent damage to its components and…
Q: Which strategy, one that works from the bottom up or one that works from the top down, is more…
A: Introduction: Software development is the process of designing, coding, testing, and maintaining…
Q: Compare and contrast two security architecture models.
A: Definition: Security architecture is described by the International Organization for Standardization…
Q: Software development uses several models, each with different relevance based on the application.…
A: Software development: Software development employs a variety of models, each of which has a unique…
Q: Which two components on a computer's motherboard are the most vital to its operation?
A: Computer's motherboard: A computer's motherboard is the main printed circuit board in a computer. It…
Q: Certain data stores will only utilise the outside tracks of a magnetic disk, leaving the inside…
A: Introduction: In this answer, we explore the potential upsides of utilizing only the outside tracks…
Q: The result of Java expression 5*7>3*(5+2) && 3*5-435&&9
A: programming Language:- A formal language called a programming language is created to convey…
Q: Mobile technology's various issues make adoption difficult. How much can you save over web-based…
A: An introduction in short Using mobile technology involves overcoming several challenges. Mobile…
Q: Methods differ from SDLC. Explain the software development life cycle (SDLC) and software…
A: The answer to the question is given below:
Q: Explain the many different search tactics, as well as the time constraints each one places on your…
A: Introduction: The term "search tactics" is commonly used to describe the numerous strategies people…
Q: SHIFTING THE ELEMENTS IN AN ARRAY Using a loop and indexed addressing, write code that rotates the…
A: This SHIFTING OF ELEMENTS IN AN ARRAY BY USING ASSEMBLY LANGUAGE is explained in two steps Step 1:…
Q: A flowchart is a visual representation of the process. Why is it of such great importance?
A: What is Flowchart ? A flowchart is a diagram that shows how a procedure or program works. To…
Q: "Computer mice"-what noun ending?
A: To move the cursor or pointer on a computer screen, a computer mouse is a necessary input device. It…
Q: How are several technical methods used in the process of identifying network intrusions?
A: A network intrusion is any illegal activity carried out on a digital network. Network intrusion…
Q: How does the internet affect your impaired life? Do you have any disability-friendly technological…
A: Start: The internet helps those who are disabled. On the internet, they have the following…
Q: For what purpose does the CPU exist, and what does it do specifically? Regarding this matter, what…
A: A computer system is a collection of computers, related hardware, and related software. A…
Q: Discuss company continuity, standards, and processes with your teammates. Name one problem that…
A: Given: Organizational policies provide direction, consistency, responsibility, accountability, and…
Q: How has networking evolved with each new generation of technology, and what are the pros and cons of…
A: Networking Technology: Networking technology is the use of technologies for the purpose of…
Q: Examine digital platform advances throughout time. How have your country's most popular websites and…
A: Digital platforms have undergone significant advances throughout the years, evolving from simple…
Q: Provide an explanation of the primary distinctions that exist between a relational database and a…
A: In this question we have to understand and explanation of the primary distinctions that exist…
Q: Is the Internet significantly different from landlines?
A: The following are the key distinctions between a phone system and the Internet:
Q: USE SIMPLE PYTHON Multithreading to perform parallel array summing. 1) Basic version with two…
A: Given values in an array of 1000 random integers (please program to generate 1000 random integers to…
Q: Considering the current state of affairs, why is it so important for people to be able to use…
A: Spreadsheets are an essential tool for data analysis, financial modeling, and project management,…
Q: Organizations confront several challenges while moving to the cloud. Which hurdles matter most? What…
A: Cloud computing allows users to use non-user-controlled computer system resources like cloud storage…
Step by step
Solved in 2 steps
- int func(int a, int b) { return (a#include void main () { int a=5,b=10,c=1; if (a && b>c) { printf("cquestionbank"); } else{ break; } }#include using namespace std; const int y = 1; int main () { int static y = 2; int i = 3, j = 4, m = 5, n = 6; %3D int a = [] (int x, int i = 1) { return x * i; } (y, 3) ; %3D int b = [=] (int x) { return [=] (int b) { return b + j; } (x) % 7; } (a); int c = [=] (int x) mutable ->int { m = 6; return [6] (int j) mutable { y = a * b; return y / j; } (x) -m; } (b) ; cout << a << endl; cout << b << endl; cout << c << endl; cout << m << endl; cout << y < endl; return 0; This program outputs 5 lines. What are they? Please explain your work and your answer.//Assignment 06 */public static void main[](String[] args) { String pass= "ICS 111"; System.out.printIn(valPassword(pass));} /* public static boolean valPassword(String password){ if(password.length() > 6) { if(checkPass(password) { return true; } else { return false; } }else System.out.print("Too small"); return false;} public static boolean checkPass (String password){ boolean hasNum=false; boolean hasCap = false; boolean hasLow = false; char c; for(int i = 0; i < password.length(); i++) { c = password.charAt(1); if(Character.isDigit(c)); { hasNum = true; } else if(Character.isUpperCase(c)) { hasCap = true; } else if(Character.isLowerCase(c)) { hasLow = true; } } return true; { return false; } }#include #include #include int main() { int i, j; printf("Columns | JIn"); for (i = 1; i< 4; ++i) { printf("Outer %6d\n", i); for (j = 0; j< i; ++j) { printf(" Inner%10d\n", j); } } /* heading of outer for loop */ /* heading of inner loop */ %3D return (0); } Create a new code modifying it to use "while loop" instead of the "for loop"#include #include #include #define SIZE 5 int nums [SIZE] = [5,0,6,1,2); int main() { int i; pid_t pid; pid= fork(); if (pid == 0) { for (i = 0; i 0) { wait (NULL); } for (i = 0; i < SIZE; i++) printf("PARENT: %d\n", nums [i] + 1); /* LINE Y */ return 0; From the above-given program, please state what will be the output at lines X and Y. Explanation in detail required for output at both lines X and Y.be recor #include #include minutes #include limit on int func(int, int, int, int); main(){ srand(time(NULL)); int a, b, c, fNum; printf("Choose three different numbers between 0-39:"); scanf ("%d%d%d", &a, &b, &c); fNum = func (a, b, c, 25); printf("\nThe result: %d", fNum); } int func (int ul, int u2, int u3, int iter){ srand (time (NULL)); int n1=0, i=0, count=0; for (;i#include <stdio.h>int main(){int d;int s[20],i, r, p, lg=0,m;char c;printf("Enter number of salesman(max 20): ");scanf("%d", &d);for(i=0; i<d; i++){ printf("\n salesman %d sales: ");scanf("%d", &s[i]);}for(i=0; i<d; i++){for(r=i+1; j<d; r++){if(s[i] > s[r]){p= s[i];s[i] = s[r];s[j] = p;}}}printf("\nsalesman lowest to highest: ");for(i=0; i<d; i++){printf("%d\t", s[i]);}for(i=0;i<m;i++){printf("\n highest sales: %d ",lg);if(lg<=s[i])lg=s[i];break;}getch();} >>> the upper part output should be like this enter number of salesman (max 20): 5 salesman 1 500 salesman 2 300 salesman 3 1000 salesman 4 200 salesman 5 1000 in the lower part the lowest to highest the output should become like this salesman 4 200 salesman 2 300 salesman 1 500 salesman 3 1000 salesman 5 1000 highest total sales : 2000#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…#include<stdio.h>#include<stdlib.h> int cent50=0;int cent20=0;int cent10=0;int cent05=0; void calculatechange(int* change){if(*change>0){if(*change>=50){*change-=50;cent50++;}else if(*change>=20){*change-=20;cent20++;}else if(*change>=10){*change-=10;cent10++;}else if(*change>=05){*change-=05;cent05++;}calculatechange(change);}}void printchange(){if(cent50)printf("\n50cents:%d coins",cent50);if(cent20)printf("\n20cents:%d coins",cent20);if(cent10)printf("\n10cents:%d coins",cent10);if(cent05)printf("\n05cents:%d coins",cent05);cent50=0;cent20=0;cent10=0;cent05=0;}void takechange(int* change){scanf("%d",change);getchar();}int main(){int change=0;int firstinput=0;while(1){if(!firstinput){printf("\nEnter the amount:");firstinput++;}else{printf("\n\nEnter the amount to continue or Enter -1 to…SEE MORE QUESTIONSRecommended textbooks for youDatabase System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSONC How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag…Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill EducationDatabase System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSONC How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag…Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education