1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alina1380 [7]
3 years ago
15

A text file has been transferred from a Windows system to a Unix system, leaving it with the wrong line termination. This mistak

e can be corrected by
Computers and Technology
1 answer:
andriy [413]3 years ago
8 0

Answer:

Text to ASCII Transfer

Explanation:

You might be interested in
What are some programs that you have used that have condition-controlled loops and count-controlled loops?
gladu [14]

Some programs that we have used that have condition-controlled loops and count-controlled loops due to the following reasons.

Explanation:

Condition-controlled loops

A program could be made more intelligent by programming it to avoid hazards. For example, if the robot vehicle is 3 cm from the edge of the table and you tell it to move forwards 5 cm, it will drive off the edge of the table. To stop this from happening, you might write a condition-controlled loop like this:

move forward

repeat until (touching table edge)  

Condition-controlled loops can be used to add a high degree of intelligence to a computer system.

Count Controlled Loops

A count controlled loop is a repetition  structure that iterates a specific number of  times

You can write a count controlled loop using a

while() loop.

For example:

counter = 0

while counter < 5:

print (“This will print 5

times”)

counter += 1

8 0
3 years ago
Write a VB.Net program to print numbers from 10 to 20 in descending order using a For Statement.
ozzi

Imports System

Public Module Module1

--Public Sub Main()

----For value As Integer = 0 to 10

------Console.WriteLine(20 - value)

----Next

--End Sub

End Module

6 0
3 years ago
Justify the need for branching and jump codes in the instruction set using real world scenarios
topjm [15]

Answer:

As in the real world, people using a program would provide different inputs, that would require different outputs. For example in a traffic light system, there could be a function that constantly checks for if the button is pressed. When the button is pressed the traffic light loop would branch out of its current running code in order to turn the lights to red, and allow the pedestrians to cross.

8 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
julia-pushkina [17]

Answer:

Option (A) is the correct answer.

Explanation:

A Computer system can be the target for the crime on which a criminal can acquire the information from the computer system which is stored on it. A Criminal is targeting the system with the help of some software that is entered on the computer system through a network.

In the above question, paragraphs are describing the content related to the crime which targets the computer system. This is a concept of a "computer as target". Hence option "A" is the correct answer while the other is not valid because--

  • Option b suggests the concept behind the storage device of a computer but in the question, it is about the crime of a computer.
  • Option c suggests the concept behind the computer is a criminal but in the question, it is about the crime of a computer.
  • Option d suggests the concept behind the communication of a computer but in the question, it is about the crime of a computer.
4 0
4 years ago
Which type of image would require you to obtain permission from the author to use the image and possibly pay a royalty to the au
ASHA 777 [7]

Answer:

Copyrighted.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Hence, a copyrighted image would require you to obtain permission from the author to use the image and possibly pay a royalty to the author for its use.

7 0
3 years ago
Other questions:
  • ____ are not associated with data from the database and are used to display such things as the report's title
    15·1 answer
  • The length of time the valve is open, expressed in degrees of crankshaft rotation, is called camshaft
    10·1 answer
  • When paying bills online, a payee is:
    9·1 answer
  • is the process of creating a message to be communicated. a. Encoding b. Decoding c. Receiving d. Sending
    10·2 answers
  • Why decomposition will be used in creating the algorithm for a game
    15·1 answer
  • Which solution eliminates the need for dedicated high-speed WAN connections between sites
    11·1 answer
  • In a typical e-mail address the host is
    14·1 answer
  • Please help with the question no. 5 and 7 please help ​
    6·1 answer
  • One reason to move to a paperless society is that printers are becoming prohibitively expensive true or false
    13·2 answers
  • Give an example of a class and an example of an object. Describe what a class is, what an object is, and how they are related. U
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!