answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling
1 month ago
3

Selma needs to ensure that users who have access to her presentation are unable to make changes to the presentation.

Computers and Technology
1 answer:
Harlamova29_29 [1K]1 month ago
6 0

Use the protected view feature.

You might be interested in
Write a program using the standard library I/O functions (fopen, fread, fwrite, fclose, ferror, feof, and fflush) to read a text
amid [951]

Answer:

Refer to the explanation

Explanation:

#include <stdio.h>

#include <stdlib.h>

#include<string.h>

int main(int argc, char *argv[])

{

FILE *fr,*fr1,*fr3; /* declare the file pointer */

char filename[256];

char search[256];

char line[256];

int count=0;

char replace[256];

printf("Enter FileName: "); // ask for filename

scanf("%s",filename);

fr3 = fopen (filename, "r");

if(ferror(fr3)) //check for any error assosicated to file

{

fprintf(stderr, "Error in file"); // print error in stderr

printf("Error");

}

printf("Input file data is");

while(!feof(fr3)) // checking end of file condition

{ //printf("inside");

fgets(line,256,fr3);

printf("%s",line);

}

printf("\nEnter String to search: "); //ask for string to search

scanf("%s",search);

printf("Enter string with whom you want to replace: "); //ask for string with whom you want to replace one time

scanf("%s",replace);

fr = fopen (filename, "r"); // open first file in read mode

fr1 = fopen ("output.txt", "w"); //open second file in write mode

if(ferror(fr)) //check for any error assosicated to file

{

fprintf(stderr, "Error in file"); // print error in stderr

printf("Error");

}

while(!feof(fr)) // checking end of file condition

{ //printf("inside");

fgets(line,256,fr);

int r=stringCompare(line,search); // comparing every string and search string

// printf("%d",r);

if(r==1 && count==0)

{

fwrite(replace, 1, sizeof(replace), fr1 ); // writing string to file.

printf("%s\n",replace);

count++;

}

else{

printf("%s",line);

fwrite(line, 1, sizeof(line), fr1 );

}}

printf("\n");

fflush(fr1); // it will flush any unwanted string in stream buffer

fflush(fr);

fflush(fr3);

fclose(fr); //closing file after processing. It is important step

fclose(fr1);

fclose(fr3);

system("PAUSE");

return 0;

}

// Compare method which is comparing charaacter by character

int stringCompare(char str1[],char str2[]){

int i=0,flag=0;

while(str1[i]!='\0' && str2[i]!='\0'){

if(str1[i]!=str2[i]){

flag=1;

break;

}

i++;

}

if (flag==0 && (str1[i]=='\0' || str2[i]=='\0'))

return 1;

else

return 0;

}

7 0
21 day ago
An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t
amid [951]
User permissions and access control. Explanation: The question describes a situation where a former employee returned to the office and installed malicious software on a computer that was set to execute a logic bomb on the first day of the next month. This script is designed to alter administrator passwords, erase files, and shut down over 100 servers within the data center. Issues related to that account might include unauthorized access by users who have permissions to system resources. If such individuals gain unauthorized access, they could easily alter or damage the system's operations. Additionally, the firewall may need to be disabled to recognize the harmful script, highlighting the necessity of keeping firewalls operational to prevent attacks from unauthorized users. Furthermore, if user roles are not clearly defined, it increases the risk of unauthorized modifications to the system, potentially leading to unforeseen outages.
5 0
26 days ago
Assume that k corresponds to register $s0, n corresponds to register $s2 and the base of the array v is in $s1. What is the MIPS
Amiraneli [1052]
Your question is missing the section C, so here is the C segment while (k<n v="" k="k+1;" answer:="" while:="" bge="" end="" while="" n="" addi="" sll="" making="" indexable="" add="" lw="" sw="" j="" end:="" explanation:="" the="" mips="" assembly="" code="" reflecting="" c="" segment="" is="" />
4 0
11 days ago
Create an algorithm that will convert dog years to human years using the assumption that 1 dog year = 7 human years. Prompt the
amid [951]

Response:

Procedure:

1. Define and set the variable one_dog_year to 7.

2.Request the user to input the dog's age.

   2.1 Capture the entered dog age and store it in variable "dog_age".

3.Generate a variable "human_age" for the corresponding human age.

   3.1 Compute the equivalent human age using the formula "human_age=one_dog_year*dog_age".

4.Display the calculated human age that corresponds to the dog's age.

7. Conclude the program.

// following is the algorithm executed in c++

#include <bits/stdc++.h>

using namespace std;

int main()

{

   // set one dog year

   int one_dog_year=7;

   int dog_age;

   int equi_h_age;

   cout<<"Enter the dog age:";

   // get the dog age

   cin>>dog_age;

   

   //determine the corresponding human age

   equi_h_age=dog_age*one_dog_year;

   cout<<"equivalent human age is: "<<equi_h_age<<endl;

return 0;

}

Result:

Enter the dog age:2

equivalent human age is: 14

4 0
18 days ago
Suppose a linked list of 20 nodes. The middle node has a data –250. Write the pseudocode to replace the middle node of the linke
oksian1 [950]
The data for the middle node shows as –250.... Please outline the pseudocode to substitute the middle node in the linked list. Assume that the head pointer is designated as Head_ptr and the entry data for the new node is defined as Entry.
4 0
1 month ago
Read 2 more answers
Other questions:
  • How many bits would be needed to count all of the students in class today? There are 5 children in the class.
    7·1 answer
  • Which of the following statements is true regarding input and output?
    12·2 answers
  • Server farms such as Google and Yahoo! provide enough compute capacity for the highest request rate of the day. Imagine that mos
    12·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    9·1 answer
  • Write a loop that reads strings from standard input, where the string is either duck or goose. the loop terminates when goose is
    7·1 answer
  • To finish creating a design for the webpage, use one shape to cut away part of the other. Create a 700 pixel by 700 pixel square
    10·1 answer
  • Xem tập các tiến trình sau đây, với thời gian cần chạy ở cột Burst Time được cho ở đơn vị mili giây.
    10·1 answer
  • Explain what might happen if two stations are accidentally assigned the same hardware address?
    15·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • #Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!