1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
3 years ago
8

A file to which information is written is referred to as a(n) ____ file.

Computers and Technology
1 answer:
Iteru [2.4K]3 years ago
4 0
The answer is <span>output.  </span>A file to which information is written is referred to as an output file.  It is  <span>a computer </span>file<span> that contains data that are the </span>output<span> of a device or program. </span>
You might be interested in
What will be displayed after the following code executes? (Note: the order of the display of entries in a dictionary are not in
iren [92.7K]

Answer:

Nothing will be printed

Explanation:

You can easily find out that FL is not a member of the Dictionary. And we are checking these in the if. Since the if condition ends up being false, the further process will not run as they will only if the condition ends up being true. Hence, nothing will be printed.

Remember, del is used to delete a dictionary item. If this would have been a true condition for if then the FL item in the dictionary would have been deleted as it, in that case, would have been present there. And then the next line would have again added the FL item, and print would have printed the dictionary items with FL item as well. However, since if the condition is ending up being false, nothing will be printed.

If cities['FL'] and print is outside if then

the output will be

{'FL': 'Tallahassee', 'GA': 'Atlanta', 'NY': 'Albany', 'CA': 'San Diego'}

6 0
3 years ago
Which is the standard font and size for most professional papers?
miskamm [114]
I think the answer is d. Any of these
I hope it's correct^^
4 0
3 years ago
Java Eclipse homework. I need help coding this|
mezya [45]

import java.util.Scanner;

import java.util.Arrays;

public class MyFamily {

   public static void main(String[] args) {

       float avg = 0;

       int smallest = 0;

       int largest = 0;

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter the name of a friend or family member.");

       String name1 = scan.nextLine();

       System.out.println("Enter "+name1+"'s age");

       int name1Age = scan.nextInt();

       System.out.println("Enter the name of a friend or family member.");

       String name2 = scan.next();

       System.out.println("Enter "+name2+"'s age");

       int name2Age = scan.nextInt();

       System.out.println("Enter the name of a friend or family member.");

       String name3 = scan.next();

       System.out.println("Enter "+name3+"'s age");

       int name3Age = scan.nextInt();

       int[] ages = {name1Age, name2Age, name3Age};

       Arrays.sort(ages);

       System.out.println("The oldest is " + ages[2] + " years old");

       System.out.println("The youngest is " + ages[0] + " years old");

       System.out.println("The average is (("+name1Age + "+" + name2Age + "+" + name3Age+") / 3) = " + ((name1Age + name2Age + name3Age) / 3) + " years old");

       System.out.println(name1+", "+name1Age + " years old");

       System.out.println(name2+", "+name2Age + " years old");

       System.out.println(name3+", "+name3Age + " years old");

       

   }

   

}

I hope this helps!

5 0
3 years ago
. Linux servers are typically stored in a locked server closet to prevent physical access by unauthorized persons. Describe why
IrinaVladis [17]

Answer:

Following are the solution to this question:

Explanation:

Physical Access to Linux Servers:

Unauthorized staff is denied access to windows server due to various reasonable factors which might damage databases and then all database depends.

Linux distributions handle their servers but it is almost important that they will be protected or hackproof to safeguards their organizations' networks.

Guess if an unwanted staff has access to the server, he/she can be using the device by just placing a simple USB or dragging the information of the database to study it even further. Here that the results stay throughout the possession of even an unauthorized person, whom no organization wants to confront.

Its attacker may also damage that server by installing a virus or any virus mostly on the server. User security can allow unauthorized staff to go on a search and retrieve the database to disc inside the database.

Warranted physical limitations:

All such physical constraints are assured because the company cannot manage a minor error in physical security.

Because conflicts with both the physical limitation will damage its database so much but leave all loopholes free to that same protection of attackers and operators.

Its physical safety guarantee should be maintained by routine server room checks and ensure that every step of safety is undertaken and results are achieved.

6 0
3 years ago
PLEASE HURRY.
Oksanka [162]

Answer:

Testing and Debugging are huge activities during software development and maintenance. Testing tries to find the problem while Debugging tries to solve the problem. Only after the testing team reports the defect, debugging can take place.

Explanation:

8 0
2 years ago
Other questions:
  • Is a protocol that allows users to log on to and access a remote computer?
    8·1 answer
  • The Subset Sum problem is a generalization of the Knapsack problem. Group of answer choices True False g
    8·1 answer
  • which statement draws an accurate comparison between social media marketing and conventional marketing?
    13·1 answer
  • "Write an iterative function iterPower(base, exp) that calculates the exponential baseexp by simply using successive multiplicat
    10·1 answer
  • You can minimize the Ribbon with a command contained on the _____.
    7·1 answer
  • Please help!<br><br> What is a non-iterative programming structure?
    11·1 answer
  • Which of the following statements tests if users walked 10,000 or more steps and ate fewer than 25 grams of sugar?
    9·1 answer
  • Computer spreadsheet is a grid of​
    9·1 answer
  • How is technology moving the business world forward?
    13·1 answer
  • The Western Siberian Plain is __________ in some places because it has poor natural draining systems.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!