answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
2 years ago
6

A U.S. social security number consists of a string of 9 digits, such as "444422333". Assume that input consists of a sequence of

9-digit social security numbers with no intervening spaces or separators of any kind:111223333444422333123456789987654321...Assume that a char array named ssn suitable for storing a social security number as a C-string has been declared . Use this array to read in 3 successive social security numbers and print each one out on a line by itself
Computers and Technology
2 answers:
harkovskaia [24]2 years ago
6 0

Answer:

767745089

Explanation:

Scrat [10]2 years ago
4 0

Answer:

void printSecurityNumber(char * securityNumber){

char subs[9];

int i = 0;

while(i < 27){

subs[i%9] = securityNumber[i];

i++;

if(i == 8){

printf("%s\n", subs);

}

}

}

Explanation:

I am going to write a for loop for this.

The "break" is at a multiple at position 8(9 digit from position 0 to 8), 17(9 digits from position 0 to 17), 26(9 digits from position 18 to 26).

void printSecurityNumber(char * securityNumber){

char subs[9];

int i = 0;

while(i < 27){

subs[i%9] = securityNumber[i];

i++;

if(i == 8){

printf("%s\n", subs);

}

}

}

You might be interested in
A data scientist is writing a Machine Learning (ML) algorithm using a large data set.
Olenka [21]

The product of the data scientist, who writes a Machine Learning (ML) algorithm using a large data set, is called a data-driven model.

A data-driven model generates insights and increases the efficiency of decision-making.

This implies that decisions are made based on the insights that the model by the Machine Learning algorithm produces.

Thus, Machine Learning algorithm or code helps entities to make insightful business decisions to increase efficiency and effectiveness.

Learn more about Machine Learning here at brainly.com/question/23738591

4 0
2 years ago
Provide an example of each of the three primary information security areas: (1) authentication and authorization, (2) prevention
snow_lady [41]

Answer:

Explanation:

1. Authentication is a method for confirming users' identities. Once a system determines the authentication of a user, it can then determine the access privileges for that user. Authorization involves providing a user with permission, including access levels and abilities. For example file access, hours of access, and amount of allocated storage space.

2. Content filtering is a software organizations use that filters content, such as emails, to prevent the accidental or malicious transmission of unauthorized information. Encryption scrambles information into an alternative form that requires a key or password to decrypt. In a security branch, an intruder is then unable to read encrypted information. A firewall is hardware and/or software that guard a private network by analyzing incoming and outgoing information for the correct markings.

3. Intrusion detection software (IDS) features full-time monitoring tools that search for patterns in network traffic to identify intruders.

4 0
2 years ago
Explain why Windows and Linux implements multiple locking mechanisms. Describe the circumstances under which they use spinlocks,
galben [10]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

Depending on the needs of the device programmers these OS have various locking frameworks. Spinlocks become beneficial for preemptive multitasking processes during which a thread will operate in such an active loop instead of risking a rest queue latency. Mutexes become beneficial to utility lockers.

  • Solaris 2 employs flexible mutexes, indicating something like this on preemptive multitasking computers, the mutex is introduced with either a spinning switch.
  • Semaphores and state variations are much more effective methods for consistency where a commodity needs to be managed for such a prolonged period of time because spinning is unstable over a prolonged time.

8 0
1 year ago
Which option describes wearable technology? A. the incorporation of technology into objects we use regularly B. rugged technolog
vichka [17]

The correct answer is

A.  the incorporation of technology into objects we use regularly

#Platogang

8 0
2 years ago
Mobile computing has two major characteristics that differentiate it from other forms of computing. What are these two character
olya-2409 [2.1K]

Answer:

mobility and broad reach  

Explanation:

The two major characteristics of mobile computing are:

Mobility: It basically refers to the portability. Mobility means that users can carry their mobile device wherever they go. This facilitates real-time communication with other devices. Users can take a mobile device anywhere and can contact with other devices and systems via a wireless network for example a user, wherever he happens to be, can log in to his email account to check his emails using his mobile phone.

Broad Reach: It basically means that the mobile device users can be reached at any time. This means that the users of an open mobile device can be instantaneously contacted. Having an open mobile device means that it can be reached by or connected to other mobile networks. However mobile users also have options to restrict specific messages or calls.

6 0
2 years ago
Other questions:
  • Julie bought a house for $315,000 and has a $285,000 mortgage. she claims she has $315,000 in equity. is she correct? if not, ho
    12·2 answers
  • Social networking sites like Office Online, PayPal, and Dropbox are used to develop social and business contacts.
    6·2 answers
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    15·1 answer
  • Given a positive integer, output its complement number. The complement strategy is to flip the bits of its binary representation
    6·1 answer
  • Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
    8·1 answer
  • Create an abstract Division class with fields for a company's division name and account number, and an abstract display() method
    14·1 answer
  • A company with a large number of hosts creates three subdomains under a main domain. For easier management of the host records,
    11·1 answer
  • A laptop gets replaced if there's a hardware issue. Which stage of the hardware lifecycle does this scenario belong to?
    5·1 answer
  • A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best expla
    15·1 answer
  • In the file BankAccount.java, build a class called BankAccount that manages checking and savings accounts. The class has three p
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!