why header files are needed in every c program ?expalin​

Answers

Answer 1

Answer:

Header files serve two purposes. System header files declare the interfaces to parts of the operating system. You include them in your program to supply the definitions and declarations you need to invoke system calls and libraries.


Related Questions

n the bus topology, a hardware device called a _____ is used at each end of the cable to absorb the transmitted signal.

Answers

In the bus topology, a hardware device called a terminators are used at each end of the cable to absorb the transmitted signal.

An integer n is divisible by 9 if the sum of its digits is divisible by 9. Develop a program to display each digit, starting with the rightmost digit. Your program should also determine whether or not the number is divisible by 9. Test it on the following numbers:


n = 154368
n = 621594
n = 123456


Hint: Use the % operator to get each digit; then use / to remove that digit. So 154368 % 10 gives 8 and 154368 / 10 gives 15436. The next digit extracted should be 6, then 3 and so on

Answers

The program is an illustration of the modulo operator

What is a modulo operator?

The modulo operator is an operator used to determine if a number is divisible by another

The main program

The program written in Python, where comments are used to explain each action is as follows:

#This defines the function

def divisible(n):

   #This sets a boolean value to false

   divcCheck = True

   #This initializes a counter to 0

   num=0

   #The following iterates and prints the digits of the number

   while n>0:

       a = n%10

       n = n - a

       n = n/10

       print(int(a),end=" ")

       #This checks if the digit is divisible by 9

       if (int(a)%9 != 0):

           divcCheck = False

   num = num + 1

   #This prints true or false, depending if the number is divisible by 9

   print(divcCheck)

Read more about python programs at:

https://brainly.com/question/16397886

School systems must constantly educate teachers and students on ways to prevent these kinds of attacks, in which people use emails to make it appear they are from a legitimate organization and to request private information, such as passwords or other information, which they use for malicious purposes.
A) firewalls.
B) hacking.
C) viruses.
D) spyware.

Answers

The answer is b). Hacking

Q2. What is the process of file management?​

Answers

Answer:

The process and act of creating an organized structure in which you store information for easy retrieval.

Explanation:

Get the binary value of your first name initial. Show your solutions and checking.


First name: _____
First name initial: V
Convert: ______​

Answers

Answer:

01010110

Explanation:

The binary value of V is 01010110

Discuss whether or not something has to be "fun" to be considered a game. Defend one position but include at least one argument for each side; you may include "one scholar argued that XYZ" as an argument for/against your position.​

Answers

Answer:

Games do not have to be fun to be games. But most are fun. Games can just be a more interesting form of a simulation, a platformer, or a digital universe you may be interested in. For that very case, one scholar argued that, "Games are games, and fun is games, too." And then, another scholar argued, "Games should be fun." Lastly, a 3rd argues that games do not have to be fun, supporting our opinion. With this knowledge, no further, we come to a conclusion.

In conclusion, games are just an interesting escape from our everyday lives. They do not have to be fun. They just need to be good.

Answer:

well, if its not fun, then its not really played, and then it becomes forgotten like the game almost doesn't exist making it not a game?

Explanation:

da answer above is better ._.

What is a PowerPoint slide?


Answers

Answer:

A PowerPoint is a presentation program to show a specific topic per slide

a PowerPoint SLIDE is just one part of for example 1 out of 10 slides

for example, if you were asked to do a PowerPoint for a project you'll probably do 20 slides and put a lot of work and detail into making this PowerPoint for a good grade so you don't fail a school year

Select L for the items that refer to General Lee, H for General Halleck, and M for General McClellan.


removed from command twice for being overly cautious

Choose.

felt a victory in the North would turn public opinion against the war

Choose.

retreated to Washington, leaving the Confederates free to attack the North

Choose.

stopped the Confederate Army at Antietam

Choose.

was offered command of Union Army after Fort Sumter

Choose

Answers

The letters that represent the names of the individuals associated with the various actions are; M, L, H, M, L

What were the Activities of Railroad Presidents?

1) The person that removed from command twice for being overly cautious was General McClellan.

2) The person that felt a victory in the North would turn public opinion against the war was General Lee.

3) The person that retreated to Washington, leaving the Confederates free to attack the North was General Halleck

4) The person that stopped the Confederate Army at Antietam was General McClellan.

5) The person that was offered command of Union Army after Fort Sumter was General Lee.

Read more about history of railroad Presidents at; https://brainly.com/question/25997960

The term 'aspect ratio' is a specification of ...
A. software.
B.
paper size.
C. printers.
D. monitors.
(1)

Answers

Answer:

I believe the correct aswer is D. Monitors

Explanation:

The aspect ratio of a display device is the proportional relationship between the width and the height of the display. It is expressed as two numbers separated by a colon (x:y), where x corresponds to the width and y to the height. Common aspect ratios for displays, past and present, include 5:4, 4:3, 16:10 and 16:9.

I hope that help!

Mira sold flowers to raise money for the annual field trip. Here is the list that shows the number of flowers she sold in 1 day.

Answers

can I see the list? for the list that shows the number of flowers

What is the difference between a binary operator and a unary operator?.

Answers

Answer:

differences between binary operatar and a unary operator

Explanation:

the operators which act upon a single operand are called binary operatar and the operators which required two operands for their action are called unary operator.

Procedural languages were in the
generation, and non-procedural languages were in the
generation in the evolution of programming languages.

Answers

Answer: B

Explanation:

Answer:

Procedural languages were in the third generation, and non-procedural languages were in the fourth generation in the evolution of programming languages.

Explanation:

got 5/5 on the test

The set of coordinating colors applied to backgrounds, objects, and text in a presentation is called:

Answers

Answer:

theme colors

Explanation:

As said, a group of colors that are used to format text and objects in a document. When you open the Color menu, these colors determine what you see.

Which type of cache is found as part of more advanced CPUs, is shared among the CPU cores and typically comes in sizes of 8 and 16 MB

Answers

Answer: Level 3

Explanation: I studied for the test

In a selection, the else clause executes ______________. a. always b. when the tested condition is false c. when the tested condition is true d. only after the if clause executes

Answers

b. when the tested condition is false

you have a variable n with a non-negative value and need to write a loop that will keep print n blank lines what loop construct should you use

Answers

Answer:

write down same applications of AI in agriculture,health,education, and business

Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement.

Answers

Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement is known to be an error message.

Why the message above?

This situation often occur when the win2016 is said to be deprecated and as such, when you use vs2017-win2016 runs, it tends to fail in course of the brownout timeframe.

Note that Deployment was canceled bymicrosoft. Visualstudio. Services. Releasemanagement is known to be an error message that shows that release deploy failed.

Learn more about  error message. from

https://brainly.com/question/11472659

Harmon, a nationwide department store, uses checkout scanners to record shoppers' purchases. Which term best describes Harmon's checkout scanners

Answers

The term that best describes Harmon's Checkout Scanners is; A touch point device

What is touch point device?

The correct description of Harmon's scanners is that they are touch point devices.

TouchPoint devices are usually wrist-worn devices, developed by a team of neuropsychologists, that alternatively stimulates both hemispheres of the brain in order to reduce physiological and psychological stress.

This corresponds with the function of Harmon's scanners.

Read more about Scanners at; https://brainly.com/question/24937533

write any five sources of information for foreign employment.

Answers

Answer: Blue, newspapers or professional journals; Red, personal contacts abroad; Green, recruitment websites.

Hope this helped!

Actives? Need help with my homework

Answers

Answer:

yea just find it

Explanation:

Because you have eaten at Red Lobster restaurants in the past and provided them with your email address, you now get notifications from them of upcoming specials and coupons for discounted menu items. This is an example of ________.

Answers

Answer:

Joining a membership.

Explanation:

Because you provided them with that email, they are now sending you updates, just like you have a membership.

What type of hard drive has no moving parts, making it fast and durable?.

Answers

Answer:

Solid-State Drive, also the fastest hard drive at the moment, Durable depending on the brand.

A ________________ is an electrical channel that transfers bits internally within the circuitry of a computer, allowing the devices to communicate with each other.

Answers

Answer:

RAM

Explanation:

Random Access Memory (RAM) is a type of memory that is used to store data. RAM data can be accessed almost instantaneously regardless of where it is stored in memory, making it extremely fast. RAM communicates with the computer's CPU at a breakneck speed. I hope this helps! ^-^

Write a line of code in python that prints the integer portion of the number 21.45.

Answers

Answer:

print("21")

Explanation:

the integer is a whole number not a float, the part of the decimal which is a whole number is 21

thank me later

Why would you get the error, "InnerHTML" cannot be defined as null. In the developer console?

Answers

Answer:

you have not defined your innerHTML

Explanation:

you need to define it in order for it to work

Answer:

you have not defined your innerHTML

Explanation:

you need to define it in order for it to work

A student enters the names of months in cells A2 to A5 with the heading "Month" in cell A1. Then he enters the number of days in each moth in cells B2 to B5 with the heading "Days" in cell B2. In order to arrange the names of the months in cells A6 to E6 with heading "Month" in cell A6 and the number of days each month in cells A7 to E7 with heading "Days" in cell A7, he can use the formula =TRANSPOSE(A1:B5).
A. True
B. False

Answers

The answer is true because it solvers by Parameters

uring the boot process, the essential portion, or core, of the operating system called the ____________________ is loaded into memory.

Answers

Answer:

kernel or boot sector

Explanation:

Who authors hype for major stars?
fans of the star
entertainers themselves
PR teams
fans of other stars

Answers

Answer:

PR teams

Explanation:

When backing up your original content and data and saving it in two places, why is it important that these two places aren't on the same device

Answers

Answer:
because a crash could cause you to lose both

Explanation:
In the debate over cloud vs. local backup, there are some types of backup that are better in certain locations. If you're performing cloud backup, incremental backups are generally a better fit because they consume fewer resources. You might start out with a full backup in the cloud and then shift to incremental backups. Mirror backup, though, is typically more of an on-premises approach and often involves disks.

This article is part of

Protecting data against loss, corruption, disasters (human-caused or natural) and other problems is one of the top priorities for IT organizations. In concept, the ideas are simple, although implementing an efficient and effective set of backup operations can be difficult.

The term backup has become synonymous with data protection over the past several decades and may be accomplished via several methods. Backup software applications reduce the complexity of performing backup and recovery operations. Backing up data is only one part of a disaster protection plan, and may not provide the level of data and disaster recovery capabilities desired without careful design and testing.

Backup applications have long offered several types of backup operations. The most common backup types are a full backup, incremental backup and differential backup. Other backup types include synthetic full backups

Who knows about creating "A Discord Bot With Python"
Only answer if you have experience

Answers

Answer:

I have!

A discord bot helps you automate tasks on the server. It's easier to manage and welcome new users, moderate, and more.

im a dev on discord

 

1 Go to the Discord Developer Portal (https://discord.com/developers/applications)

2 Click on the "New Application" button and give your application a name

3 Go to the "Bot" tab and click "Add Bot" to create a bot account for your application

4 Make sure to copy your bot's token as you will need it later

5 Open your terminal or command prompt and run pip install discord.py

6 Create a new Python file in your project folder and name it something like bot.py

7 Import the Discord.py library and create a new client object

8 Add an event listener for the 'message' event to listen for messages in the server and respond to them

9 Add the bot token to the client object:

client.run('your-bot-token-here')

10 Run the bot

   In your terminal, run python bot.py to start the bot

   

11 If everything is working, you should see a message in the console that says "Logged in as [your bot's name]!"

Other Questions
Please Help I need it!!A car travels 40 miles north in the first 40 minutes of a trip. The same car travels 30 miles west in the next 30 minutes of the trip.What is true about the motion of the car?----A.The car is traveling at a constant speed.B.The car does not accelerate during the trip.C.The car is traveling at a constant velocity.D.All of the above. Why is this chapter titled Finding My Voice? The trait for rabbit fur follows an inheritance pattern of incomplete dominance. If a rabbit with short fur and a rabbit with long fur mate, what length fur will the offspring have? What is the square root of 100. Find the total area of the irregular polygon shown? * m 11 m 36 sqm 84 sq.m 88 sqm What were the major military events in the European and PacificTheater's? Please, please please please help me Answer:Triangle CTriangle DTriangle BTriangle A At the beginning of a month, the number of people rock climbing increases and then decreases by the end of the month. The number of people zip-lining steadily increases throughout the same month. The models show the number of people y for each type of activity based on the number of days x since the beginning of the month.a. Write a system of equations that represents this situation.b. On what day or days were the same number of people rock climbing and zip-lining?c. How many people were participating in each activity on that day or days? Expand. (1-4m)(m^2-3m+8) your answer should be a polynomial in standard form. only the evaluate question. please answer quickly The Roman basilica that had three great groin vaults over its central space and three barrel-vaulted bays to each side was the: What is the importance of rip vin wrinkle.summary In Diagram 5, POQ is the diameter of the circle with centre O .Find the area, in cm, of the shaded region. Use 22/7 Which theme does this climax most connect with? It takes evil to catch evil. Pride leads to eventual ruin. Bad things happen in groups. Evil cannot stay hidden for long. What is another word for the techniques used to make art?A methodsB genreC medium ________ is a type of root system.Stemroot systemTaproot systemLeaf root systemSeedling root system Discuss the similarities and differences between skeletal, smooth, and cardiac muscle tissue. Please help me, because I am struggling on this picture. Horatius fought the Etruscansand lost.TrueFalse how many molecules are in 90g of agno3