1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Trava [24]
2 years ago
9

With "read" function, which one of the following statements is NOT correct? a.If the read is successful, the number of bytes rea

d is returned. b.If the end of file is encountered, 0 is returned. c.The number of bytes actually read is always same as the amount requested for a successful read.d.The read operation starts at the file's current offset.e.Before a successful return, the offset is incremented by the number of bytes actually read
Computers and Technology
1 answer:
worty [1.4K]2 years ago
3 0

Answer:

a. If the read is successful, the number of bytes read is returned.

b. If the end of file is encountered, 0 is returned.

Explanation:

A read function is one of the functions used in computer programming. A read function is used to read an information or data that was written before into a file.

If any portion of a regular file before to the end of file has not been written and the end of file is encountered the read function will return the bytes with value 0.

If read function has read some data successfully, it returns the number of bytes it read.

You might be interested in
What are the main dimensions of information system and their components
nydimaria [60]

Answer:

The dimensions of information systems include organizations, management, and information technology. The key elements of an organization are its people, structure, business processes, politics, and culture. An organization coordinates work through a structured hierarchy and formal standard operating procedures.

7 0
3 years ago
Universal Containers is tracking the interviewer's ratings of candidate in Salesforce. They would like to easily link the Candid
uranmaximum [27]

Answer:

Hierarchical is scenario is used to between condition and ratings.

Explanation:

Master   -details its open up all details of the candidate and his rating to Universal Containers is tracking by interviewer ratings. where they are no classified. Just data collection.

Lookup:- where it fetches all details and further analysis will be a big task.

Search  :- it is a just search where relevant information based on queries.

Hierarchical;- it is further classified and it is very to do analysis and takes decisions.

Since it is classified further drill down is possible and make a good analysis report can be made.

3 0
2 years ago
How many answers do you need to be able to write messages on here??
Kipish [7]

1,000

Hope this helps!



~Courtney

3 0
2 years ago
What types of storage can be used to access your data on another computer?
Ivenika [448]
<span>You could use cloud storage. Basically, the things you save are actually saved on another computer, that is, on another server, that is used as a hard drive for many pcs. You can access the cloud storage if you have internet and it works like a normal hard drive. There are even laptops that don't have storage other than cloud storage.</span>
6 0
2 years ago
1. Name the first PC virus.<br> 2. In which language are viruses written for Microsoft programs?
Tju [1.3M]

Answer:

The first IBM PC virus in the "wild" was a boot sector virus dubbed (c)Brain, created in 1986 by Amjad Farooq Alvi and Basit Farooq Alvi in Lahore, Pakistan, reportedly to deter unauthorized copying of the software they had written. The first virus to specifically target Microsoft Windows, WinVir was discovered in April 1992, two years after the release of Windows 3.0.

Explanation:

HOPE THIS HELPS

6 0
2 years ago
Read 2 more answers
Other questions:
  • Which line of code will generate a random integer between 7 and 77?
    10·1 answer
  • PLEASE HELPPPPPPP
    15·1 answer
  • Does anybody know if that apple watch is actually worth what it costs?
    9·2 answers
  • An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongo
    11·2 answers
  • Should a waiting thread receive priority over a thread first attempting to enter a monitor? What priority scheme, if any, should
    9·1 answer
  • Write a Java program to count the characters in each word in a given sentence?Examples:Input : geeks for geeksOutput :geeks-&gt;
    10·1 answer
  • Which type of system is used to analyze, evaluate, and integrate the output of other systems?
    5·2 answers
  • PLEASE ANSWER THIS ASAP‼️
    10·2 answers
  • You can put ______ on your phone.
    10·1 answer
  • Why womt this code work????
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!