1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
11

What happens when you use diff to compare two binary files that are not identical? (You can use gzip to create the binary files.

) Explain why the diff output for binary files is different from the diff output for ASCII files.
Computers and Technology
1 answer:
Hunter-Best [27]3 years ago
5 0

Answer:

When there's a comparison between binary files with diff, there's a message from the utility that says there's a difference when the files differ or there's no message when the two are same. ASCII files comparison is made by the diff utility line-by-line. there's no provision to make comparisons on a byte by byte basis. in that case use cmp.

Explanation:

You might be interested in
Research the Next-Generation IPS (NGIPS) solutions involving four primary editions including FirePOWER 8000/7000 series, NGIPS f
dezoksy [38]

Answer:As cyber attacks evolve, network security requires unparalleled visibility and intelligence covering all threats for comprehensive protection. And with differing organizational responsibilities and agendas, you need a consistent security enforcement mechanism. These increasing operational demands call for a renewed focus on dedicated NGIPS to provide a deeper level of security and visibility for the enterprise.

Explanation:

6 0
3 years ago
The fact that the impact of changes in the elements making up an IT (software) project are not proportional or intuitive is rela
Furkat [3]

Answer:

Multidimensionality

Explanation:

Multidimensionality is the ability to exhibit many diverse characteristics thereby giving programs the ability to manipulate the storage and presentation of data in various ways without disrupting the integrity and reliability of the data. It is very important that users have the capability to customize and change their views of data and user information to suit their specific needs and allow users to carry out any type of analysis within the database.

5 0
3 years ago
2. Assuming that the bits in an integer are numbered from 0, from right (least significant) to left (most significant), write an
3241004551 [841]

Answer:

Explanation:

Two ways of interpreting this question

(I) Shifting all the bits along with the choosen four,

in that case it will be i1>>2;

(ii) Just shifting the choosen four bits and keeping the remaining as it is.

It is equivalent to replacing the first four bits of i1 with i1>>2. let us call N = i1, and M = i1>>2.

max = ~0 //All one's

//1's through position 4, then all zeros

left = max - ((1<<4) - 1);

So we just have zeros between bits one to four and other are one.

Now final step;

(N&left) | m

4 0
3 years ago
Windows service accounts will use passwords consisting of at least 15 characters.
vichka [17]
False because u need 16 letters
4 0
4 years ago
Help me learn how to code
Sholpan [36]
What type of coding are you trying to learn?
3 0
3 years ago
Read 2 more answers
Other questions:
  • the task is to ask the user for three numbers and find the average which pseudocode gives you the comment outline for task​
    10·1 answer
  • Will mark brainliest if correct. First come, first serve.
    15·1 answer
  • Ayuda no encuentro el concepto de estas tres preguntas: ¿para qué sirve la administración en la ofimatica o informática? ¿Que so
    13·1 answer
  • Technology has proliferated in Kenya and Somaliland, with text messages used to replace cash, creating mobile money use that, on
    11·1 answer
  • What are layers? Why would a layer be used?
    9·1 answer
  • A local bank has just one branch. It sets up a peer-to-peer network for all devices on the system. The bank would like to be abl
    12·1 answer
  • For what specific purpose is the TM9400 P25 Mobile designed? What is the benefit of having a mobile communications device that a
    10·1 answer
  • In what situation is a read receipt notification not sent when an email is opened or previewed bya recipient?
    8·2 answers
  • What are the primary IP addresses for DNS servers hosted on the x128bit, iskytap and cloudparadox domains
    8·1 answer
  • i was wondering if anybody would have a season 1 or 2 or 3 Fortnight account they never use and was gonna ask if i could play on
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!