1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ratling [72]
3 years ago
14

If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper

ation. ​
Computers and Technology
1 answer:
RSB [31]3 years ago
3 0

Answer:yes

Explanation:yes for a good night of love and love love miss

You might be interested in
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
3 years ago
When you see a blank pointer this means you can drag the row or column border to change height or width
Orlov [11]
No, you would see arrows pointing in opposite directions <--> like so
7 0
3 years ago
Is the app scener safe? its a chrome webstore app on computer.​
Sophie [7]

Answer:

Maybe

Explanation:

If you are unsure if a website is safe look for signs. If its asking you to allow advertisement then no. I suggest you download a VPN before going to the website just to be safe

5 0
3 years ago
Picture related to cyber safety
Fantom [35]

Answer:

?????

Explanation:

4 0
3 years ago
Read 2 more answers
When you are saving a file, what does word suggest by default as the name of the document?
LenaWriter [7]
Whatever you have written on the page is what it'll name it.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Wich of these is an example of magnetic storage
    11·1 answer
  • You have no control over who views your social network information
    13·2 answers
  • When a hardware or software interrupt occurs, the CPU calls________
    14·1 answer
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • This is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits. a. Scrip
    14·1 answer
  • Describe five different ways databases can be processed
    14·1 answer
  • In the wireless telecommunications industry, different technical standards are found in different parts of the world. A technica
    5·1 answer
  • Use the variables k and total to write a while loop that computes the sum of the squares of the first 50 counting numbers, and a
    6·1 answer
  • Working mechanism of computer ​
    10·1 answer
  • LEARNING TASK 3 about: REAMING THE RIGID STEEL CONDUIT.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!