1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vilka [71]
2 years ago
5

A file named "dogs.txt" exists and has 60 lines of data. You open the file with the following line of code.

Computers and Technology
1 answer:
padilas [110]2 years ago
8 0

Answer:

The are 11 because you include your start code line plus another 10

Explanation:

You might be interested in
Edhesive coding practice 3.4​
allsm [11]

I'm sorry i have to go to sleep.. Can we continue tm?

In the morning

8 0
3 years ago
Read 2 more answers
Reading (BCK FORM 2C IT 2020-2021)
qaws [65]

Answer:

Use grammarly

Explanation:

6 0
3 years ago
Read 2 more answers
Is TCP really more secure than other L4 protocols by default?
yulyashka [42]

Answer:

Yes TCP is

Explanation:

3 0
1 year ago
Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birt
Fed [463]

Answer:

All of the above

Explanation:

The report is a piece of critical information in the company's file system that should be saved and secure from adversaries. All the options should be implemented to prevent and manage data leakage.

3 0
3 years ago
Explain ,how the computer network reduces cost of operation? (don't copy from any website)​
melomori [17]

Answer:

Computer network reduces the operation cost as it allows to share software and hardware in the network.

4 0
2 years ago
Other questions:
  • How is a Personal Fact Sheet used? a. A Personal Fact Sheet is a tool used to market yourself and build your network b. A Person
    13·2 answers
  • If $hourlyWage contains the value 10.00 and $hoursWorked contains the value 20, what value will $bonus contain after the followi
    11·1 answer
  • If anything is changed on an already-tested module, regression testing is done to be sure that this change hasn’t introduced a n
    13·1 answer
  • Multiply 1101 and 0110 in binary.
    10·1 answer
  • Identifies the row and column that forms the cell
    11·1 answer
  • Which of the following represent advantages of GPL-licensed software? Check all of the boxes that apply It is always free of cos
    12·2 answers
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Choose the true statement below. (html)
    5·1 answer
  • Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Referenc
    7·1 answer
  • Write any two disadvantage of First generations computers​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!