1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
10

Write a program, called compute_stats.c, which opens a data file, called numbers.txt, which contains of a list of positive integ

ers, computes their sum and product, finds the largest number, and writes the results to an output file called statistics.txt. Test your program by creating a numbers.txt file and by inserting several number combinations in this file
Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
7 0
??????????????????????
You might be interested in
To be eligible for the leadership training program offered by the office, a student must have at least 2 years of post-secondary
erica [24]

Answer:

The formula for the given problem is:

=IF(OR(D2>=2,G2>"Yes"), "Yes", "No")

Explanation:

Please see attachment for step by step guide

7 0
4 years ago
The correct banner marking for a commingled document
pochemuha

Answer:

The correct banner marking for a commingled document is Headers and footers are mandatory and must be identical All sections or portions must be marked or portion marked CUI markings and Limited Dissemination Control markings appear after all classified marking in both Banner Lines and Portion Markings

Hope this helps :D

Please Mark Brainliest :D

6 0
3 years ago
1. What are copyright laws? (6 points)
Serggg [28]

Can u pls help me. srry i had to ask u on here lol

8 0
3 years ago
Which 10 gigabit standard uses mmf cabling for distances up to 300 meters and is often used for sonet campus networks?
WITCHER [35]

I guess the correct answer is 10GBase-SW

10GBASЕ-SW mеdia typеs arе dеsignеd fοr usе οvеr shοrt wavеlеngth (850 nm) multimοdе fibеr (MMF). Thе dеsign gοal οf thеsе mеdia typеs is frοm 2 mеtеrs tο 300 mеtеrs οf fibеr distancе, dеpеnding οn thе typе and quality οf thе multimοdе fibеr. Lοngеr distancеs arе pοssiblе dеpеnding οn thе qualitiеs οf thе fibеr οptic cablе usеd. Thе 10GBASЕ-SW mеdia typе is dеsignеd tο cοnnеct tο SΟNЕT еquipmеnt, which is typically usеd tο prοvidе lοng distancе data cοmmunicatiοns.

5 0
3 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
Other questions:
  • Luis is cloud-based( microsoft bot framework). true false
    13·2 answers
  • What is the purpose of system calls, and how do system calls relate to the OS and to the concept of dual-mode (kernel-mode and u
    14·1 answer
  • What are the three business writing formats
    12·1 answer
  • Physical activity such as sports or even a brisk walk can help reduce
    7·2 answers
  • The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configura
    8·1 answer
  • 10. Question<br> What are the drawbacks of purchasing something online? Check all that apply.
    5·1 answer
  • Which is not and input device , keyboard , joystick, Monitor, Microphone​
    10·2 answers
  • How to recover deleted photos after deleting from recently deleted
    13·2 answers
  • How to make classs constructer java.
    14·1 answer
  • Benchmark test compare similar systems performing in which tasks
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!