1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
3 years ago
10

Explain what happens if you try to open a file for reading that does not exist.

Computers and Technology
1 answer:
ZanzabumX [31]3 years ago
8 0

Answer:

Exception is thrown and the file is created with 0 length.

Explanation:

While opening a file there is an error occur which shows the file does not exist that means an  exception is thrown.

And this error can be occur when the size of the file is very very low means the file is a size of 0 length. So to avoid this error we have to exceed its length from the zero length.

You might be interested in
John is analyzing strange behavior on computers in his network. He believes there is malware on the machines. The symptoms inclu
enot [183]

Answer:

Boot Sector Virus

Explanation:

A malicious software or malware is an executable line of code, programmed by a cybercriminal for ill intentions. There are many types of malware namely; viruses, rootkit, keylogger, trojan horse etc.

A boot sector virus is a kind of malware that runs before the operating system, affecting the boot sector of the hard disk, so even when a linux live cd is running as the operating system, the virus is still active.

5 0
3 years ago
MATH PLZ HELP ITS DUE IN 4 MINUTES​
zheka24 [161]

Answer:

2

Explanation:

8 0
3 years ago
Read 2 more answers
What general strategies can the network managers use to reduce congestions?
Harrizon [31]

Answer:

 There are different types of strategies that can be used by the network manager for reducing the congestion are as follows:

  • By monitoring the traffic of the network properly we can easily reduce the congestion in the network.
  • By segmenting the network properly, it helps to reduce the network congestion.
  • We can also reconfiguring the TCP/IP (Transmission control protocol) setting on the network.
  • We can also use the backpressure routing technique.

7 0
3 years ago
A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
Sergeu [11.5K]

Answer:

The answer is D.

Explanation:

because the other answers doesn't make sense.

6 0
3 years ago
Hello, this is for my compute science class, and I don’t know the answer, please help? Thank you in advance =)
Olin [163]

Answer:bd

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • The first digital keyboard was the DX-7, introduced by the Yamaha company in 1983.
    15·1 answer
  • Radiation requires a heated liquid to transfer energy. Please select the best answer from the choices provided T F
    10·2 answers
  • Data cannot be sorted of filtered accurately if there are ________.
    10·2 answers
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • According to the Big Five Factors model, all but _____ are categories.
    11·1 answer
  • What is GIGO ?<br>plz answer me​
    7·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • Explain the characteristics of 1st generation computers​
    15·1 answer
  • Which feature of REPL.it would you use to transmit your program to a friend?
    12·1 answer
  • What feature is available to add a auggestion in the margin of someone else's document.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!