1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
3 years ago
7

A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code.

Computers and Technology
2 answers:
lapo4ka [179]3 years ago
8 0

Answer:

The answer is 3

Explanation:

Edge 2021.

kirill115 [55]3 years ago
3 0

Answer:

2 lines

Explanation:

The "w" flag will overwrite any content, so the existing 80 lines are lost.

Then, if you write two lines, there are two lines in the file.

You could argue that the final newline character causes a third line to be present, but logically, there are two lines.

You might be interested in
Which of the following must be configured in certain applications to help ensure data aggregation and data isolation are impleme
Hitman42 [59]

Answer: (B) Log forwarding and (F) Zones

Explanation:

 According to the given question, the log forwarding and the zones are the  applications that are configured for ensuring the data isolation and aggregation that are implemented on the various types of critical devices and the applications.

  • The log forwarding is one of the type of application that are used for correlated the various types of events from the multiple resources from the one Forti-analyzer to the another unit.
  • The zones is one of the type of virtual system that are used in multiple resources.

Therefore, Option (B) and (F) is correct.

5 0
3 years ago
Which is the last step in conducting a URL search?
m_a_m_a [10]
It all depends what you are looking for...
3 0
3 years ago
Read 2 more answers
What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sen
defon

Co-Ordination Difficulty: ...
Waste of Resources: ...
Larger Interests of the Enterprise Neglected: ...
Emergency Decision not Possible: ...
Lack of Qualified Managers: ...
Certain Activities Decentralization not Possible:
8 0
3 years ago
What to do if you click on a phishing link on iphone
gregori [183]

Answer:

Nothing, just exit out of it

Explanation:

5 0
3 years ago
Read 2 more answers
Brainlist will be added!✴
Bess [88]

You can transfer this file by inserting your USB or Lightening Cable into the computer's USB Port, then you go into the Computer Window on the computer and find your device and then look for the file in it's specific folder!

5 0
3 years ago
Other questions:
  • Write an essay on online collaboration, how to do it, the challenges, resolving the challenges, and consider whether the risks a
    12·1 answer
  • What is data security
    14·1 answer
  • Carrie works on a help desk and is assigned a ticket that was automatically generated by a server because of an error. The error
    14·2 answers
  • What task does the casting director do, apart from auditioning actors?
    8·1 answer
  • Which HTML tag is used to add a paragraph to a web page?
    15·1 answer
  • Given two int variables , firstplacewinner and secondplacewinner, write some code that swaps their values . declare any addition
    11·1 answer
  • What are 3 software programs for mobile computing?
    10·1 answer
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
  • Why are computers better than humans at solving a problem like finding the shortest route between ten different cities?
    15·2 answers
  • Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!