A because my sister told me and it was corecct
Answer:
Open a file when the program needs to work with it and close the file as soon as you have finished using it.
Explanation:
In programming, we have some files that are stored in memory, or created in some other section of the program to save information.
<u><em>for example</em></u>, we want to save the data of a class or school faculty to create a database. For this purpose I need to create a file.
As the files that we will create may contains data, these files will utilize computer resources such as, memory (RAM, Cache) and other resources. While programming, we need these resources as well.
<em>Therefore, It is necessary to open a file when the program needs to work with it and close the file as soon as we have finished using it. The reason is that, it takes computer resources which are limited. </em>
Answer/Explanation:
Explain the reason you need to put the caller on hold.
Ask for the person's phone number, in case the conversation is cut off.
Promise to return in a minute—or your best estimate of how long the hold will last. If you think the delay will be longer than a couple of minutes, ask for a number and a time when you can call back.
If, despite your best efforts, the delay is taking longer than anticipated, check in with the caller so that he doesn't feel abandoned. Again, offer to call back, "rather than keep you holding."
When you return to the phone, apologize for the inconvenience and thank the caller for his patience.
Use the caller's name frequently to add a sense of connection.
The first step you can take when putting a caller on hold and making it a satisfying experience is a systematic one. When a caller is on hold, 60 seconds seems like an eternity, so see if you can program the phone system to play music (calming classical or jaunty jazz is best) to break this perception of an interminable wait. Aside from that, however, putting someone on hold in a professional way depends on your behavior. The golden rule to keep in mind is as follows: how would you like to be treated if you were on the other end of the line?
MAKE ME THE BRAINLIEST!!!!!!!!!!!!
Zenmap is the graphical User Interface representation for
NMAP Security Scanner. It is an open-source program designed to make NMAP easy
for starters to use. Typically, it is used to collect and identify a list of
hosts, OS, as well what services are running on them by using a port scanning
tool. It is used specifically for the scanning and vulnerability phase of
ethical hacking.
A network administrator who wishes to audit all the devices
on a specific IP scheme in a network can use NMAP. The admin can go ahead and
scan the ports to know exactly which ports are closed and which
are opened.
Answer:
SQL pattern matching allows you to search for patterns in data if you don't know the exact word or phrase you are seeking. This kind of SQL query uses wildcard characters to match a pattern, rather than specifying it exactly. For example, you can use the wildcard "C%" to match any string beginning with a capital C.
Explanation: