1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
11

What happens to a message when it is deleted?

Computers and Technology
1 answer:
anzhelika [568]3 years ago
3 0

When you move messages around or delete them, the data actually stays put

You might be interested in
What is the correct sequence of the phases in the systems development life cycle?
HACTEHA [7]
1. Requirements gathering/analysis.
2. Design.
3. Development.
4. Testing.
5. Maintenance.
7 0
3 years ago
Write a Python program that takes a file name as input and generates the following output: File size in bytes and KBs Time the f
Airida [17]

Answer:

See explaination

Explanation:

import os

import time

from stat import *

file = input("Enter file name: ")

details = os.stat(file)#stores statistics about a file in a directory

print("File size: ", details[ST_SIZE])#retreiving size

print("File last accessed time: ", time.asctime(time.localtime(details[ST_ATIME])))#access time

print("File last modified time: ", time.asctime(time.localtime(details[ST_MTIME])))#modified time

print("File creation time: ", time.asctime(time.localtime(details[ST_CTIME])))#creation time

print("First character: ", file[0])

print("Middle character: ", file[len(file) // 2])

print("Last character: ", file[len(file) - 1])

num_words = 0

num_lines = 0

f=open(file, "r")

lines = f.readlines()

for line in lines:

num_lines = num_lines + 1

num_words = num_words + len(line.split())#add no. of words in that line

print("Number of lines: ", num_lines)

print("Number of words: ", num_words)

8 0
3 years ago
The matrix theory is used in the ___ technique
wlad13 [49]

Answer:

The matrix theory is used by hill cipher.

Explanation:

Th technique which uses matrix theory is hill cipher technique.

Hill cipher technique is a polygraphic substitution cipher and it is based on linear algebra.

For encrypting a message in Hill Cipher technique each block of n letters is multiplied by an invertible matrix of nxn and that to against modulus 26 and  for the decryption of the message, every block is multiplied by the inverse of the matrix that was used for encryption.

3 0
3 years ago
If you play video games, please answer these questions it’s for a survey for my game development class!!
yarga [219]

Answer:

Doom, fortnlte, mlnecraft, ark survival evolved, ark survival of the fittest, terraria, raft, among us, ect.

First person shooters, Third person shooters, Creative games

8-10 years

More VR, better graphics, more realistic

Maybe, not anytime soon.

Explanation:

5 0
2 years ago
PLEASE HELP ON TECHNOLOGY
Lilit [14]

Answer:

1,D. identify target employers, select an open position, prepare and submit

application materials

2,B. A person may have traits similar to other successful employees.

Explanation:

Hope It Helps :3

6 0
3 years ago
Other questions:
  • The pseudoinstructions that are available in an assembly language programming environment usually found in the Select one: a. CP
    6·1 answer
  • Which two keys on the keyboard allow an access user to move the insertion point to the next field to the right in datasheet view
    11·1 answer
  • This measures how close a biometric reading is to a prerecorded template
    11·1 answer
  • The communication channel used in IMC must rev: 12_06_2018_QC_ CDR-223 Multiple Choice match the traditional channel used in tha
    14·1 answer
  • . ____________is/are the JSP ImplicitObject(s).sessionapplicationconfigAll of GivenNone of Given
    9·1 answer
  • Rob creates a Course_Details table that has four columns: Course _ID, Course_Name, Semester and Credits. A course may have 0.5 c
    6·2 answers
  • What is the meaning of Re:?
    12·2 answers
  • To copy and paste the image in MS Word the dash option is used​
    9·1 answer
  • Edhisive 3.5 code practice
    9·1 answer
  • What is ransomware<br>я​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!