1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
3 years ago
6

"Because Standard Error and Standard Ouput represent the results of a command and Standard Input represents the input required f

or a command, only Standard Error and Standard Ouput can be redirected to/from a file. True or False
Computers and Technology
1 answer:
Genrish500 [490]3 years ago
8 0

Answer:

True

Explanation:

When ever we open a file using any programming language there can be only two possibilities that something from the file will be put in the output stream( here we assume that the file opening does not cause any error ) or there will be error like if the file does not exist or the syntax with which the file is being accessed is not according to the standards of language used.

You might be interested in
(BRAINLIEST QUESTION!!!)
docker41 [41]

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

4 0
3 years ago
Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____.
Alina [70]

I think the answer is... data

3 0
3 years ago
High-end tools in project management software have enterprise and _____ functions that summarize and combine individual project
e-lub [12.9K]

Answer:

Portfolio management  is the correct option.

Explanation:

Project management software is that type of software that is used to accomplish the management related works such as planning, organizing, summarizing and many other works related to the management.

So, project management software is used for functioning the enterprise and portfolio management functions by which the employee combines and summarizes project information.

8 0
3 years ago
"assignment is to create a program that will read a value from an array, and then place this value in another array with the loc
White raven [17]

Answer:

#include <iostream>//including libraries

using namespace std;

int main()

{

int arr[6] = { 0,1,2,3,4,5 };//make sure size of arr is 1 less than secArr

int secArr[7];//second array (1 element bigger)

for (int i = 0;i < 6;i++)//looping through each element (6 times)

{

 secArr[i + 1] = arr[i];//transferring elements to second array and shifting by 1 cell

 cout << secArr[i + 1] << endl;//printing elements of second array

}

return 0;//terminating program

}

Explanation:

The array size can range from any number. just make sure to keep arr one less than secArr. This is because we need the room for the extra element. This task is to help you understand how array work and how to parse through them using loops. For loops are the best for this task because even if you think intuitively, they work for as long as there are items in the array. and you can define the size yourself.

5 0
3 years ago
These operating systems were referred to as command-based.
Doss [256]

{\underline{\boxed{\bf{MS - DOS \:  and \:  UNIX}}}}

3 0
2 years ago
Read 2 more answers
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • A geologist is part of what career feild
    6·1 answer
  • When sending an electronic cover letter, an e-mail address is sufficient contact information.
    10·2 answers
  • How many valence electrons are present in the atom of the atomic number of 12?
    10·1 answer
  • Before inserting a preformatted table of contents, what must you do first?
    8·1 answer
  • Determining the Services Running on a Network Alexander Rocco Corporation has multiple OSs running in its many branch offices. B
    10·1 answer
  • What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
    11·1 answer
  • In the previous project, you are storing the first name of the gamer. Write a phrase to the game right before the first word wit
    6·1 answer
  • What is an example of an assumption and dependency that an automated stocking application project would include in an SRS?
    13·1 answer
  • How many ways are used to insert an image from file?koi h kya​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!