1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svlad2 [7]
3 years ago
5

Create a Raptor program to store a list of customer names and phone numbers entered by the user to a text file. Save your text f

ile as “Customers.txt”.
Computers and Technology
1 answer:
Aloiza [94]3 years ago
3 0

Answer:

b

Explanation:

You might be interested in
In ancient times what did kings and tribals chiefs use to communicate
mel-nik [20]

Answer:

they used sign language to communicate and also pegion was used to communicate

8 0
3 years ago
How do you delete a slide from your presentation after selecting it
Sergeeva-Olga [200]
Use your right clicker and it should pop up as delete slide

6 0
4 years ago
Table Setting in any occasion can add to the beauty and significance of the event. It may
Rudiy27

Answer:

HMMMM IM THINKING HMMMMM

Explanation:

7 0
3 years ago
You maintain an RODC running Windows Server 2012 R2 at a branch office, and you want Juanita, who has solid computer knowledge,
ludmilkaskok [199]

Answer:

Make Juanita's account  a delegated admin in the RODC's computer.

Explanation:

Making Juanita an administrator on the RODC's computer will confer on her higher privileges than a regular user. As an admin, she will be able to make changes on the computer, carry out tasks like updates on drivers and software, and change security settings, access all files and folders, manage other user accounts and entire management of the computer since she has the necessary skills and knowledge.

5 0
3 years ago
_____________ is the characteristic of a resource that ensures that access is restricted to only permitted users, applications,
Maksim231197 [3]

Answer:

The answer to this question is "Confidentiality".

Explanation:

The answer is Confidentiality because in any computer system many files are important for there user. If the file was deleted, corrupted or stolen from the computer. So the user faces the difficulty to avoid this type of problem computer system provides a technique that is access control or it is also known as Confidentiality. It is a technique that controls who or what type of user's use of resources in a computing environment.

So the answer to this question is Confidentiality.

4 0
3 years ago
Other questions:
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • The use of quick styles is a great way to save _____.
    6·1 answer
  • Which is the most common drive letter where Windows stores most data and programs? A. A B. B C. C D. E
    12·2 answers
  • A _____ is made up of rows and columns and is used to organize information.
    12·2 answers
  • Why is failure important when you are designing a solution to a problem?
    6·2 answers
  • Which of the following is part of a person's digital footprint? *
    5·1 answer
  • PLEASE HURRY! Match terms in the first column with the order descriptions in column two.
    12·1 answer
  • Which situation is the best choice for using telehealth?
    12·1 answer
  • Type the correct answer in the box. Spell all words correctly. Which language should you use to add functionality to web pages?
    5·1 answer
  • Hypertext enables you to navigate through pieces of information by clicking the __________, that connect them.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!