With a C program (memory map), data in _____ is initialized by the kernel to arithmetic 0 or null pointers before the program starts executing. The C declaration (for example, "long sum[1000];") appearing outside any function causes this variable to be stored in _____.

Answers

Answer 1

Answer:

The answer is "  Uninitialized data segment ".

Explanation:

It (memory map) field whenever a C program is locked to run, the kernels must allocate information into 0 or null pointer in this section until the process runs. This variable, that is outside of any function, has been stored in uninitialized data item by the C statement (like, "long amount[1000];").  

If we did not declare the data segment, it also called bss, in which all block which begins with the symbol and is called for an old assembly language operator.


Related Questions

Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest rating.

Answers

Answer:

The given statement is false.

Explanation:

A Website reputation seems to be a built-in feature or tool. It retains knowledge about users, through visiting pages. The committed resources for this site depending on either the website as well as the basic details about its design. The reputation including its Website has been used to strengthen the safety of phishing attacks or malicious content.

Therefore the solution given above is the right one.

if you want to refine your google search by date, which option should you use?

Answers

Answer:

If you want to refine your Google search results by date, you should use Advanced search.

Explanation:

Answer:

Advanced Search.

Explanation:

Just go down to settings at the bottom of google and choose advanced search and fill in the boxes so your search comes up more specific.

All of the following are challenges presented by changing technology as it relates to the special events field EXCEPT: A. the ability to manage much of the coordination of an event from a smartphone B. the static nature of technology C. the need to continually master new software programs and applications D. the ease of facilitating events provided by technology

Answers

Answer:

The answer is "option C".

Explanation:

The change in technology can be characterized as that of an increase in the production feasible thru the innovations, new technologies, and dispersion procedures at a specified amount of production. This technology concerns the Excluding area of special events, even if it needs the new master software and applications continuously, and the wrong choices can be defined as follows:

In choice A, it is a part of event management that's why it is wrong. In choice B it is wrong because it is used in learning. In choice D, it is wrong because it is used to make progress.

All of the options given are challenges to technology except D. the ease of facilitating events provided by technology.

It should be noted that changing technology can be challenging. It can bring about the ability to manage much of the coordination of an event from a smartphone.

It also leads to the static nature of technology and the need to continually master new software programs and applications. The ease of facilitating events provided by technology isn't a challenge.

Learn more about technology on:

https://brainly.com/question/8184227

Which statement is true about teams?

Answers

Answer:

Which is true of jet streams

A The subtropical jet stream flows to the east while the polar jet stream flows to the west

B The subtropical jet stream lies between the westerlies and polar easterlies

C The polar jet stream is generally stronger than the subtropical jet stream

D The polar jet stream lies between the polar easterlies and trade winds

The subtropical jet stream lies between the westerlies and trade winds.

Jet stream is defined as "a narrow, variable band of very strong, predominantly westerly air currents encircling the globe several miles above the earth." Each hemisphere has 2 or 3 primary jet streams that follow their same basic courses.

Explanation:

A team is a more collaborative and joint organization of individuals that function to perform similar set of tasks. The team all members work in accords with each other and complete the tasks on time.

The team is formed by a like minded people and has all characteristics of cooperation, coordination and friendliness. Thus the option D is correct . A Teams is more productive than with fewer individuals.

Learn more about the true about teams.

brainly.com/question/12078417.

what are the disadvantageous of emails

Answers

Answer:

it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.

Need internet connection.without it can't use.

it can be hacked.and also lack the personal touch..

Answer:

they can cause misunderstandings and people read with diffrent

moods

Explanation:

which of the following is not a selection tool in Adobe photoshop
a) Rectangular marquee tool
b) Single row marquee tool
c) Double row marquee tool
d) Single column marquee tool​

Answers

B. I believe this is the answer to your question

I maybe be wrong, but still... hope this helps ♥︎

The one that is not a selection tool in Adobe Photoshop is the single-row marquee tool. The correct option is b.

What is Adobe Photoshop?

When working with pixel-based graphics created for print, the web, and mobile apps, Photoshop is your go-to program. With the help of robust editing tools, you can adjust exposure and color balance, crop and align photographs, change the colors in your shot, erase imperfections from a portrait, and integrate numerous images into a single scene.

Photoshop is still one of the greatest photo editing programs for beginners to learn, despite the fact that you can feel intimidated by it as a novice photographer. Adobe Photoshop is an editing program that works with layers, which can take some getting accustomed to but is worthwhile.


Therefore, the correct option is b) Single row marquee tool.

To learn more about Adobe Photoshop, refer to the link:

https://brainly.com/question/17356292

#SPJ6

Felicity wants to capture the attention of the regular subway commuters in her area through her print advertisement. She wants to use a stationary print medium that commuters can see from a distance. Which print medium should Felicity choose?
(Correct answer only)

A. magazine
B. newspaper
C. flier
D. billboard
E. brochure

Answers

Answer:

D. billboard

Explanation:

Commuters can most likely see billboards from a distance.

The print medium to be chosen by the felicity should be Billboard. Thus, option (D) is correct.

What is billboard?

Billboard is a HORDING and huge outdoor advertisement board That can be seen by many people. In order to be seen by the most automobiles and pedestrians, billboards are frequently erected in busy places like highways and urban areas.

Many of the company publish their brands and products on the billboard for spreading brand awareness and spreading the word of their company  to as many people can know about the product.

According to the above scenario, Felicity can capture the attention of the regular subway commuters in her area through billboard advertisement. From a distance, commuters can see the advertisement.

Therefore, it can be print medium to be chosen by the felicity should be Billboard. Hence, option (D) is correct.

Learn more about Billboard here:

https://brainly.com/question/8494411

#SPJ2

You administer computers on a Microsoft Windows 2003 TCP/IP network. On the network, you want to use a domain name-to-Internet Protocol (IP) address name resolution system that provides a central database on a server to resolve domain names to IP addresses. Which options should you implement on your network

Answers

Answer:

The answer is "Using the Domain Name System(DNS)".

Explanation:

It is the name database whereby web domain names were located or converted into their IP addresses. Its domain name maps its username used by users and finds a site at a user's IP range for the location of a site.  

It includes the internet and also has  DNS for any time search on the internet if they know this or not. It should recall the IP address of every device to access on the specific web site which you needed, that's why we can say that the DNS is used to implements on the internet.

if your computer is gliching what do you do to stop it and some times it turnes off what do you do

Answers

Answer:

You can take it to the shop to fix it since it happens often ig

Explanation:

I Hope This Helps bro

You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge

Answers

Answer:

The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".

Explanation:

The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.

In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.

c) Explain GIGO briefly.​

Answers

Answer:

Is is also a computer science acronym that implies bad input will result in bad output. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

IT'S FORMULA IS GIGO: GARBAGE IN GARBAGE OUT...

HOPE IT'S HELPFUL FOR U!!

AND PLZ MARK ME AS BRAINLIEST IF U LIKE THIS ANSWER!!!!

fullform of mips plz ​

Answers

Million instructions per second (MIPS) is an approximate measure of a computer's raw processing power.

Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions

Answers

Answer:

To enable VI editor automatically display lines as numbered, the following steps must be taken:

Step 1: Press the Escape key to exit the insert or append mode.

Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.

The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.

Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc

Cheers!

can we draw a formula triangle for velocity?​

Answers

Answer:

Yes we can actually draw a formula triangle for velocity

Explanation:

I can't explain why but if u wanna calculate the velocity of something using a diagram then you will draw a trapezium and in that trapezium there are two triangles and a rectangle so you will split it into two triangles and trapezium so I think we can actually draw a formula triangle for velocity

Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.

Answers

Answer

Wash your hands thoroughly before using the computer.

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?

a. motherboard
b. CPU
c. graphics card
d. sound card

Answers

Answer:

all options

a, b and c the most important

Explanation:

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

Does anyone know what happened to Cole Morgen, the actor?

I looked on the internet about him and it turned out that he was 24 years old, but it is the only thing that appears about him.​

Answers

Answer:

Cole Morgen has been on stage acting in theatre and dance since the age of 4.He has been a part of many local theatre productions. His first professional play was "Dead End" starring Jeremy Sisto and directed by Nicholas Martin at the Ahmanson Theatre followed by and a part in the Arthur Miller's play "All My Sons" directed by Randall Arney at the famous Geffen Playhouse.

Cole was cast in his first feature film as Kevin James's son Eric in the current Adam Sandler film "I Now Pronounce You Chuck and Larry" directed by Dennis Dugan.Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.Besides acting, Cole loves tap dancing and is always looking to improve his skills. He won the national tap competition last summer taking the title of Mr. Junior Cole has an unlimited amount of enthusiasm that he brings to everything that he does. Not only is he a very talented and versatile actor and tap dancer, he is a kind and gentle soul. He has always carried a vision of giving back to his community in some way. On his birthday/holidays, instead of receiving gifts, he has managed to figure out a way to make a difference. In the past he has collected food for animal shelters, toys for children, and performed at retirement homes for fun. Cole loves music and plays the piano and guitar. Cole enjoys swimming, soccer, bike riding, sailing, chess,and origami. Cole is never without a book and credits his reading to strengthening his creative side and inspiring him to meet the challenge for future acting roles.

Hackers often raise the trust level of a phishing message by modeling the email to look similar to the internal email used by the target company. This includes using logos, formatting, and names of the target company. The phishing message will often use the name of the company CEO, President, or Managers. The time a hacker spends performing research to locate this information about a company is known as

Answers

Answer:

Reconnaissance

Explanation:

Your company has decided to implement a wireless network. The wireless network users must be able to connect to resources on your internal network, including file, print, and DHCP services. Which options should you implement?

Answers

Options:

A Infrastructure mode

B Ad hoc mode

C a wireless access point

D static IP addresses

E APIPA

Answer:

A. Infrastructure mode

C. a wireless access point

Explanation: A DHCP is a server that makes use of s standard protocol called dynamic host configuration protocol to automatically assign internet protocol (IP) addresses and other computer parameters to clients. It gives them the opportunity to effectively make use of other network services such as DNS( domain name system) and NTP(network time protocol).

What are responsibilities of entrepreneurs? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders
What are responsibilities of employees? Check all of the boxes that apply.
to own businesses
to work for companies
to be responsible for employees
to be responsible to stakeholders.

Answers

Answer:

The correct options are;

1) To own businesses

To be responsible to employees

2) To work for companies

To be responsible to stakeholders

Explanation:

The entrepreneur is responsible for setting up and managing the establishment as well as provision of motivation for the employees. The entrepreneur gives direction and vision to the business which the employees follow, and as such the entrepreneur is responsible for being laudable and dependable and consistent

The employees are responsible for the work they do for the companies is done in a safety and healthful to them

The employees are responsible for the health and safety of other stakeholders for their actions and in-actions and to cooperate with the safety efforts of the employer

Answer:

to own business, to be responsible for employees, to work for companies.

Explanation:

Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!

Answers

Answer:

Software Program Reinstallation

Use the following steps to reinstall factory installed software programs:

Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.

Figure : Recovery Manager

Recovery Manager main screen

Under I need help immediately, click Software Program Reinstallation.

On the Software Program Reinstallation welcome screen, click Next.

Look in the Factory installed programs list for the software program you want to reinstall.

If your software program is listed, select the title.

If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.

Figure : Select program to reinstall

Software Program Reinstallation window

Click Next.

If you are not prompted to uninstall the program before reinstalling it, continue to the next step.

If you are prompted to uninstall the program before reinstalling it, follow these steps.

Click Start (), and then Control Panel.

Under Programs, Uninstall a program.

The Uninstall or change a program window opens.

Figure : Uninstall or change a program

Uninstall or change a program screen

Select the program you want to remove.

Click Uninstall or Uninstall/Change at the top of the program list.

Read and respond to any messages that appear while the software is being removed from your computer.

Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.

When the reinstallation is complete, select Yes, and then Finish to restart the computer.

The attacker sent data that was able to manipulate the return address that is reserved to store expected data

Answers

Complete Question:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions?

Answer:

A buffer overflow.

Explanation:

In Computer science, a buffer can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM).

In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For example, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In this scenario, the vulnerability exploit which resulted from the attacker's actions by manipulating the return address that is reserved to store an expected amount of data is referred to as a buffer overflow.

Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing

Answers

Answer:

Testing

Explanation:

From the question, we understand that Carlos just finished the coding of the app.

In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;

This stage is an integral part of the implementation process and according to the question, the coding has been completed;

The next phase or stage after the implementation phase is testing.

Hence, Carlos is getting ready to test the app.

Answer:

Testing                                   I took the test I definetly testing <3

15 points please help!!!!


David works at a company that provides financial solutions. He wants to create an interactive presentation for his company. Which interactive platforms can David use for this presentation?

David can use an interactive or a for his presentation.

Answers

Answer:

Powerpoint presentation

Explanation:

Powerpoint presentation is a part of Microsoft office that is established by Microsoft. PowerPoint. It is used to present the company visions, missions, key points in a short and in an attractive way by using the various designs, pictures, audio clips, etc

Here David wants to create an interactive presentation so he should use the powerpoint presentations so that he could present the company visions, objectives, etc

pls help help me is good help me helping is very good

Answers

Answer:

-56 negative

Explanation:

Which of these is NOT an input device?
O keyboard
O mouse
O blinking light
O microphone

Answers

Blinking light is not one of the awansers

what are the means of hardware security?​

Answers

Answer:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

Explanation:

Thank you

Explanation:

Hardware security is vulnerability protection that comes in the form of a physical device rather than software that is installed on the hardware of a computer system. ... Common examples include hardware firewalls and proxy servers.

What is the key function of a sales team?
A. to maintain customer-retailer interaction
B. to create appealing advertisements
C. to maintain fan–developer communication
D. to develop customer–fan relationships

Answers

Answer:

A. to maintain customer-retailer interaction

Explanation:

A sales team is a subdivision in a company that is dedicated to making sales for the company and they are responsible for meeting the growth goals of that company.

The key function of a sales team is to maintain a healthy customer-retailer relationship or interaction because it is from this good relationship that goods and services are sold.

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network

Answers

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?

(Select two).

a. Use shared secret authentication

b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE

c. Configure devices to run in ad hoc mode

d. Use open authentication with MAC address filtering

e.  INSTALL A RADIUS SERVER AND USE 802.1X authentication.

 

Other Questions
justify that business is an integral part of human activity A number is multiplied by 8, and that product is added to 2. The sum is equal to the product of 2 and 25. Find the number. Today, Li has $900,000 (treat this as a cash inflow) in an account that gives an 8% return each year. He has been investing $7,000 a year at the end of each year for 30 years. How much did he have in his account 30 years ago In 2008, the once thriving company took a financial blow during the Great Recession. Profits fell, butthat was not the story the leaders of the company were telling. The CEO was obviously aware of thecorruption happening in her company and even encouraged it for her own gain. Unethical accountingpractices made the company appear to be profitable to shareholders. The company's net worth seemed tohold steady as the rest of the market fell, day after day. Finally, a whistleblower in the accountingdepartment uncovered the scheme. Unbelievably, none of the wrongdoers were arrested.4Which of these sentences is an opinion disguised as a fact?O The company's net worth seemed to holu siecdy as the rest of the market fell, day after day.The CEO was obviously aware of the corruption happening in her company and eve i encouraged itfor her own gain.Profits fell, but that was not the story the leaders of the company were telling.In 2008, the once thriving company took a financial blow during the Great Recession. convert 72 into grades. What is an application letter?A: An application letter is used to apply for a specific job and includes keywords from the job posting.B: An application letter describes in detail your schooling, work experience, and any other experience.C: An application letter summarizes your intern experience for potential employers.D: An application letter is used to inquire about open positions or positions that may open in the near future Assume that you are a first-time driver and you are responsible for finding, obtaining, and paying for your own auto insurance. Put the following situations in the order you think they should or do occur. Number the situations 1-11, with 1 being the first event and 11 being the last event. Pay deductible. - Allow insurance company to view the damage. - Oops! I got into a fender bender. - Take drivers education. - File a claim with your insurance company. - Buy auto insurance. - Receive valid insurance card from insurance company. 3. Finalize claim with your insurance companyFinalize claim with your insurance company. 1. Take and pass the driving test (get my drivers license). - Exchange insurance information with the other driver. 2. Search for insurance (and be a smart insurance shopper!). helppppppppppppppppppppppppp!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! What two styles of guitar are both used in hip-hop music? A) Country and folk B) R&B and glide C) Funk and rhythm D) Slide and twang what is integration movement if a point is chosen inside the large circle what is the probability that it will also be inside the small circle? 27What is the value of the expression -x(y - 3)2 for x = -2, y = 6 ?HELP! answer if you can plz and thank you.. An electron experiences a force of magnitude F when it is 5 cm from a very long, charged wire with linear charge density, lambda. If the charge density is doubled, at what distance from the wire will a proton experience a force of the same magnitude F? 1. The cost of buying some books is partly constant and partly varies with the number of books bought. The cost is #4800 when 20 books are bought and #8000 when 40 are bought. Find the cost when 1000 books are bought What groups successfully lobbied the governor of Texas in 2013 over a bill that would have allowed employees alleging they had been subject to wage discrimination to sue their employers in court? Name two planets without satelites One number is six times another number. Their difference is 35. Wht are the two numbers? If sine theta equals one over three, what are the values of cos and tan ? find the area of the shaded region PLS HELP ME ON THIS QUESTION I WILL MARK YOU AS BRAINLIEST IF YOU KNOW THE ANSWER!!