1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
3 years ago
6

"Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required f

or a command, only Standard Error and Standard Ouput can be redirected to/from a file. True or False
Computers and Technology
1 answer:
Genrish500 [490]3 years ago
8 0

Answer:

True

Explanation:

When ever we open a file using any programming language there can be only two possibilities that something from the file will be put in the output stream( here we assume that the file opening does not cause any error ) or there will be error like if the file does not exist or the syntax with which the file is being accessed is not according to the standards of language used.

You might be interested in
Protocols at which layer of the OSI model have the primary function of moving datagrams through an internetwork connected by rou
Vladimir [108]

Answer:

"Network layer" is the correct answer to the given question .  

Explanation:

The network layer is interconnected with different networks by providing permission to the network. This job is done by sending the packets in the network. The main aim of the network layer is to provide the logical addressing, routing, and fragmentation of packets.

The network layer is the layer of the OSI model whose primary function is moving the packets or datagrams in the internetwork which is connected by the routers.  

5 0
3 years ago
Which software-development methodology would be best if an organization needed to develop a software tool for a small group of u
xxTIMURxx [149]
I think prototyping model is best
3 0
3 years ago
You are configuring a network attached storage (nas) appliance. what file sharing protocol(s) could you use to allow access to w
kicyunya [14]

Most clients should support Server Message Block (SMB)/Common Internet File System (CIFS).

<h3>What is CIFS used for?</h3>

Common Internet File System (CIFS) is a network filesystem protocol used for providing shared access to files and printers between machines on the network. A CIFS client application can read, write, edit and even remove files on the remote server.

<h3>What are CIFS servers?</h3>

CIFS stands for “Common Internet File System.” CIFS is a dialect of SMB. That is, CIFS is a particular implementation of the Server Message Block protocol, created by Microsoft.

To learn more about Internet File System , refer

brainly.com/question/13008468

#SPJ4

6 0
2 years ago
A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
ch4aika [34]

The example where the alarm of the house set up, delivery updated should be provided, etc should represent the function example of the artificial intelligence.

The following information related to artificial intelligence is:

  • It refers to the human intelligence where the machines could be treated as humans and according to this, the actions should be mimic.
  • It should be used for any kind of machine where the traits should be associated along with the mind of the human-like for learning & problem-solving purpose.

Therefore we can conclude that The example where the alarm of the house set up, delivery updated should be provided, etc should represent the function example of the artificial intelligence.

Learn more about the machine here: brainly.com/question/2555822

3 0
3 years ago
What is a router?
DIA [1.3K]

Answer:

A) a device that sends data to the receiving device

Explanation:

3 0
3 years ago
Other questions:
  • Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being
    14·1 answer
  • ________ is typically used as the last string of letters in the name of a website. Group of answer choices the name of the indiv
    13·1 answer
  • Possible consequences for plagiarism, listed in CAVA's Academic Integrity Policy, may include:
    9·1 answer
  • __________ involves determining what qualities are to beused to perform project activities.
    9·1 answer
  • Select the correct navigational path to mark all teachers who have achieved “excellent” on their evaluations a red background.
    11·2 answers
  • A character with the point size of 10 is about 10/72 of once inch in height
    8·1 answer
  • Write a cash register program that calculates change for a restaurant of your choice. Your program should include: Ask the user
    11·1 answer
  • Which option on the Format tab is used to modify particular portions of the chart?
    13·1 answer
  • What were the names of Henry VIII's six wives?
    9·2 answers
  • Kim is writing a sql query that will pull a list of customers with outstanding orders and the sales rep for each order. What sho
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!