1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergejj [24]
4 years ago
11

In linux, a(n) ____ is a data structure that stores all information (such as file permissions, ownership, and file type) about a

file except the actual data and filename.
Computers and Technology
1 answer:
Galina-37 [17]4 years ago
4 0
Hi,


Answer => <span>Inode


Good Lessons </span>
You might be interested in
Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to
Alik [6]

Answer:

#include<stdio.h>

#include<stdlib.h>

int main(void){

int seedval;

scanf ("%d", &seedval);

srand(seedval);

printf("%d\n", rand()%10);

printf("%d\n", rand()%10);

 return 0;

}

Explanation:

The given code is poorly formatted. So, I picked what is usable from the code to write the following lines of code:

#include<stdio.h>

#include<stdlib.h>

int main(void){

This line declares seedval as integer

int seedval;

This line gets user input for seedval

scanf ("%d", &seedval);

This line calls the srand function to generate random numbers

srand(seedval);

This prints a random number between 0 and 9

printf("%d\n", rand()%10);

This also prints a random number between 0 and 9

printf("%d\n", rand()%10);

 return 0;

}

8 0
3 years ago
What are the two major types of sas steps?
QveST [7]

The two major SAS steps are data and proc.

SAS programming structure is based on two essential steps, Data and Proc.

1. The DATA step:

This involves collecting and uploading the essential data to the program memory. It is used to update, modify and edit the data in case of any errors once it has been added to a dataset. New datasets can be created from existing ones by updating, editing, and/or merging them. at the end of this step, SAS data sets are created.

2. The PROC step:

This step processes and analyses the data collected into datasets in the previous step. it is used to perform specific functions on the data. at the end of the proc step, a result or report is produced.

In a SAS code, each line of code should begin either with a DATA or PROC step.

<u>While the other options are incorrect because: </u>

<u />

  • Analysis: analysis is done in the PROC step.
  • Content: Data or content is collected in the DATA step.
  • Stat: a stat function acquires the status information regarding a specific file. Functions are performed on the datasets in the PROC step.
  • Run: This command is used to execute a code.
  • Import: Datasets are created by importing data from other datasets and outside.
  • Print: the report produced at the end of the PROC step can be printed as a hard copy.

You can learn more about SAS at

brainly.com/question/13615203

#SPJ4

8 0
2 years ago
Host B is sending an email intended for the user on Host A to the email server. What protocol is being used to send the message
Lynna [10]

Answer:

I think that part A is correct option

6 0
4 years ago
Which of the following is a reason photographing animals can be difficult?
erma4kov [3.2K]
They always move, so its hard catching them still, and if they are in action, you can't get a good picture because it will come out blurry. Hope this helps. Let me know if you need anything else.
4 0
3 years ago
Read 2 more answers
A broadcast network is one in which a transmission from anyone attached station is received by all other attached stations over
malfutka [58]

Network layer is third layer of seven layers in the network technology. In network layer and physical data transmission been made through Ethernet or wireless, which Is connected to router and connect to other workstation or desktop or laptop.

<u>Explanation:</u>

On network layer connection is established, on success connection next layer is transport layer it is fourth layer of server layers.

Following error detection can be occurred

1. Accessing folder

2. Sometime immediate conflict  on tcpip address

3. Sometime subnet mask different

4. Host different

5. Ping to workstation on tablet or laptops  some dropping the packets

Transport layer always successful as end to end communication.

5 0
3 years ago
Other questions:
  • What are factors that limit a technological design
    13·1 answer
  • Consider the following declaration: double[] sales = new double[50]; int j; Which of the following correctly initializes all the
    11·1 answer
  • A _____ is a link on a web page that leads to another web page.
    13·1 answer
  • Keystroke loggers are stealth software packages that are used to monitor keyboard activities. Which is the best location to plac
    7·1 answer
  • Media applications that play audio or video files are part of a class of workkloads called "streaming" workloads (i.e., they bri
    9·1 answer
  • What was the history of technology since the 1980s to now and how is it used in classrooms?.?. PLEASE HELP
    13·1 answer
  • The ______ cloud service model provides virtual environments online that can be tailored to the needs of developers
    7·1 answer
  • Match the context details with the pattern that applies.
    7·1 answer
  • The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi
    14·1 answer
  • when a picture is downloaded off the internet and then posted to social media, can the social media platform tell it was downloa
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!