1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
5

Blank spaces or unseen control characters in a data file are referred to as

Computers and Technology
2 answers:
GalinKa [24]3 years ago
5 0

Answer:

White spaces or WHITESPACE

Delicious77 [7]3 years ago
3 0
White spaces are “blank spaces or unseen control characters in a data file”
You might be interested in
which of the following is the full path and filename of the file that contains information about which interrupt request (IRQ) c
Drupady [299]

Answer:

INCOMPLETE QUESTION.... Options not provided, However, the answer is

/proc/interrupts

Explanation:

This file records the number of interrupts per IRQ on the x86 architecture. The output of this file is tabular.. with the first column for the IRQ number, another column for each CPU in the system, a third column the reports the type of interrupt and finally the last column holds the name of the device located at that IRQ

7 0
4 years ago
Which of the following operation is not performed by a mouse​
Stolb23 [73]

Explanation:

didn't evaluation into question

4 0
4 years ago
You coded the following class: public class N extends String, Integer { }When you compile, you get the following message:N.java:
lidiya [134]

Answer:

Hi DancingGrace! The issue with the code is that it is trying to extend multiple classes which is not a feature in Java programming.

Explanation:

The extends keyword allows a class to use the attributes and properties of the base class it is extending and add more features and properties into it's own class. This is useful in programming where different models share similar properties but are slightly different. An example would be designing a class for Car and Bike. Both have some similar properties like wheels, engine, etc, however they are different forms of transport. A useful implementation would be to define a class called Vehicle with similar attributes, and have the Car and Bike extend it.  

7 0
3 years ago
How can chess computers be programmed so that it can be so accurately adjusted to a skill level ranging from a beginner to a gra
Elis [28]
They are artificially intelligent. They watch thousands of hours of videos of the game they are going to play. After they learn, they challenge themselves against themselves and save all the moves it used that time, they play another game against the saved game and if they best it then they save the new and repeat. I am not sure about this because I am just a 15 yr old but the early ones brute forced the game and one. Brute Forcing is a way to try out every possible move and pick the most like to succeed or the most efficient one, brute force is also used in hacking or cracking passwords that have something in common. Like let's say ur password is Jakeis35. I would make a list that would be:
Jake
jake
Is
is
35
34

and with a software it will put together every possible pair and will stop when it matches the password on the server or if the password let it login.
5 0
3 years ago
why is it important to include keywords that represent each of the essential concepts that make up your research question when y
SpyIntel [72]

Answer:

hi

Explanation: hi

7 0
3 years ago
Other questions:
  • In database systems, the dbms enforces rules about which user can perform which action when. The rules are known as ________.
    10·1 answer
  • . Which game was the most popular free download in Apple®’s app store by January 2014, despite poor reviews and plagiarism accus
    14·2 answers
  • Philip is thinking about customizing his motorcycle. A paint job, saddlebags, and a radio would cost $600. His motorcycle is old
    15·2 answers
  • What is the difference between the new and open commands on the file menu
    12·1 answer
  • Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called ________ controls
    5·2 answers
  • A(n) _____ is a computer network that uses Internet Protocol technology to share information, operational systems, or computing
    14·1 answer
  • Which task is performed by the artificial intelligence programmer?
    7·1 answer
  • According to the presentation, integrity and ethics are particularly important for careers in which of the following pathways?
    5·1 answer
  • describe the impact of technology in your life . how does it affects your human relations with other people .​
    12·1 answer
  • All of the following are properties of a relation except __________.Group of answer choicesThe order of tuples (rows) is not sig
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!