1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
10

Select the correct answer.

Computers and Technology
2 answers:
Sladkaya [172]3 years ago
5 0

A. Machine Language is correct

Ivanshal [37]3 years ago
3 0
A, Machine language
You might be interested in
Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
Zanzabum

Answer:

/*

Student: Hugo Meza

Date: February 15, 2019

Description: This program mimic the cat command from Linux. Checks whether the source file

has the right permissions, and then writes in the console its content.

*/

#include <stdio.h>

#include <fcntl.h>

#include <unistd.h>

#include <errno.h>

int hasPermission(char *filepath){

int returnval;

// Check file existence

returnval = access (filepath, F_OK);

if(errno == ENOENT){

printf ("%s does not exist\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n", filepath);

return 0;

}

// Check read access

returnval = access (filepath, R_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

// Check write access

returnval = access (filepath, W_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

return 1;

}

int main(int argc, char* argv[]){

if(!argv[1]){

printf("Error. Specify file to open\n");

return 0;

}

int fd;

char *fp = argv[1], content[fd];

if(hasPermission(fp) == 0)

return 1;

fd = open(fp, O_RDONLY);

int bytes = read(fd,content,sizeof(content)-1);

write(1, content, bytes);

close(fd);

return 0;

}

Explanation:

7 0
3 years ago
private members of a class are accessible only from _____________ of the same class or from their friends
maxonik [38]

Answer: Within other member

Explanation:

 The private data member is also known as private function in the computer programming language. The private keyword is basically used to specify the access level and also provide the variable and the methods control to the programmers in the class.

In the class, the variables and the method are directly access by the other methods with the same class but not directly access by the derived class. Therefore, the private members of the class are easily access from the other member of the similar class and also from friends.    

8 0
3 years ago
What type of element addresses the recovery of critical information technology (it) assets, including systems, applications, dat
TiliK225 [7]

Disaster recovery type of element addresses the recovery of critical information technology (it) assets, including systems, applications, databases, storage and network assets.

<h3>What is disaster recovery plan in information technology?</h3>

A disaster recovery plan (DRP) is a formal document produced by an organization that contains explicit instructions on how to respond to unplanned happenings such as natural disasters, power outages, cyber-attacks and any other disruptive events.

<h3>What is a disaster recovery plan and why is it important to the organization?</h3>

A disaster recovery plan describes procedures for resuming work quickly and reducing interruptions in the aftermath of a disaster. It is an important part of the business continuity plan and it allows for sufficient IT recovery and the precluding of data loss.

To learn more about Disaster recovery, refer

brainly.com/question/24131287

#SPJ4

8 0
1 year ago
When you use the tilde operator (~ in a url for the attribute of a server control, it represents the _____ directory of the webs
Verizon [17]
The tilde operator represents the root directory of the website.
4 0
3 years ago
Explain what the hazard detection unit is doing during the 5th cycle of execution. Which registers are being compared? List all
kondaur [170]

Answer:

<em>The registers that are compared are instructions 3 and 4</em>

<em>Explanation:</em>

<em>From the question given,</em>

<em>Recall that we need to explain what the hazard detection unit is doing  during the 5th cycle of execution and which registers are being compared.</em>

<em>Now,</em>

<em>The instructions on the 5th cycle, at the stage ID/EX and IF/ID:</em>

<em>The instruction values are in ID/EX : sub $t2, $t3, $t6 (instruction 3)</em>

<em>The instruction values are in IF/ID: sub $t3, $t1 $t5 (instruction 4)</em>

<em>The register $t3 is compared in the instructions 3 and 4</em>

<em>The hazard detection unit between instruction 4 and 5t o be compared, it need to find out the values of $t1</em>

<em />

7 0
3 years ago
Other questions:
  • Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi
    13·2 answers
  • 1. Create a detail report that will display all SCR courses in alphabetical order, with the course name and the instructor name
    6·1 answer
  • Why is e-mail better for informative and positive messages than for negative ones?
    6·1 answer
  • Jenny is working on a laptop computer and notices that the computer is not running very fast. She looks and realizes that the la
    14·1 answer
  • If a small monster collector:- Has 16 small monster containment devices and intends to use all of them.
    10·1 answer
  • All dogs = 199999990158161231
    11·2 answers
  • Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of
    8·1 answer
  • A major public university graduates approximately 10,000 students per year, and its development office has decided to build a We
    10·1 answer
  • Will this website ever get itself together to stop people from sending links?
    9·1 answer
  • _____ allows a function or operator to perform different tasks depending on the types of the arguments or operands. Group of ans
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!