1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pepsi [2]
4 years ago
6

Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil

e = open("games.txt", "w") You write two lines to the file in the program. How many lines are in the file when you close your file?
A. 2
B. 82
C. 80
D. 0
Computers and Technology
1 answer:
Aliun [14]4 years ago
8 0
I’m not 100% sure about this but I think it is A
You might be interested in
Write a memo to the vice president, outlining the steps an employee might have taken to create an e-mail message and make it app
Natali [406]

Answer:

Following are the memo to the vice president:

Explanation:

In this question, the president claims, that he got a threatening e-mail from the Maui worker. HR acknowledged that all of the workers should always be dismissed, in its protection, that worker claims that he did not send the message but he does not recognize why the message implies him return address. Here is a note for the vice president, who explains how an employee could have produced an email and made it look to be from another worker's account. That stuff we want will be progressively explained as follows:

a) The manipulating and e-mail used only by spammers and attackers were called this technique. In the SMTP server, it sends messages, that you can set up to send your spammer to the email addresses. Instead of a mail confirmation, I d the forger requires the receiver to see the next employee I d email. that recipient doesn't understand who sent the message.

b) The e-mail Systems information allowing for accessible transfer is used by the intruder or forger. It  must use an attacker order to verify communication with the SMTP server command:  

telnet smpt.server.name 25    

Its name of the SMTP server is smpt.domain.name, and the port is 25.

c) when the last stage is successful as well as a link created, this order to imitate an email account only with command can be entered:

MAIL from: Email-id

It creates a problem for the worker that sends the e-mail with the same id

d) Hacker sets the email of the receiver to:  

RCPT to: boss email-id  

It sets the beneficiary as the e-mail above.  

e) By entering an order, you can create the email data:  

DATA It may also adjust the date by using command and Any date we would like to use.  

Date: (date you would like)  

We should settle on the following:  

Subject: (your topic)

f) We press Insert after the topic is written. In this body can then be e-mail forms. It produces the text.  

g) its email forged is forwarded.

3 0
4 years ago
What runs horizontally and is identified with numbers?
kramer
D. the answer is Column 
6 0
3 years ago
Read 2 more answers
Explain the basic method for implementing paging.
iogann1982 [59]

Answer:

The answer is below

Explanation:

In order to carry out the basic method for implementing paging, the following processes are involved:

1. Both physical and logical memories are broken into predetermined sizes of blocks otherwise known as FRAMES and PAGES respectively

2. During processing, Pages are loaded into the accessible free memory frames from the backing store. The backing store is however compartmentalized into predetermined sizes of blocks whose size is equal to the size of the memory frames

8 0
3 years ago
NEED HELP PLEASE-
zysi [14]

Answer:i believe it is patents. i could be wrong

Explanation:

To protect your interests, consider two common strategies employed by inventors, amateur and professional alike. First, you can file a provisional patent application (if your invention is patent able)

5 0
3 years ago
Read 2 more answers
Why are businesses willing to provide more goods at higher prices
irina1246 [14]
It depends on what kinda "goods" your talking about clothes they don't have a choice cause material costs a lot overall it's their way of getting a lot of money because some people do fall for the prices and their is a lot of competition around some businesses
5 0
3 years ago
Other questions:
  • Drag the tiles to the correct boxes to complete the pairs.
    7·2 answers
  • Which of the following commands contains an error?
    8·1 answer
  • An adiabatic capillary tube is used in some refrigeration systems to drop the pressure of the refrigerant from the condenser lev
    15·1 answer
  • American company Software Unlimited is planning to expand its operations to the Bangor Republic where the group is the primary u
    7·1 answer
  • Differentiate between trusted-source-security and antispoofing-security techniques.
    10·1 answer
  • What do you think is the most fascinating aspect of the internet?
    7·2 answers
  • Calvin needs to design a simple yet professional interface for his users. Which option should he implement?
    9·2 answers
  • Partes de la ventana principal de Microsoft excel 2013 con sus respectivas funciones
    14·1 answer
  • Sarah is a detail-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
    11·1 answer
  • Suppose in an Excel spreadsheet, the value in cell A1 is 25. By using the Macabacus local currency cycle shortcuts (Ctrl + Shift
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!