1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
3 years ago
12

HURRRY WILLL GIVE BRAINLIST!!!!!!

Computers and Technology
1 answer:
Flura [38]3 years ago
8 0

Answer:

true

Explanation:

the best way to learn is take notes eaverytime

some one trying to teaching you some

You might be interested in
Why should you log into your online or mobile app account with the travel charge card vendor?.
yuradex [85]

The reason why I  should  log into my online or mobile account with the travel charge card vendor is that it provides easy access to statements, payments, and mobile alerts.

<h3>What is Travel Charge Card?</h3>

Travel Charge Card  can be regarded as a card that provides travelers with a safe as well as available method to pay for expenses that goes with official travel.

This can be done by Filing a dispute with the GTCC vendor within 60 days.

Learn more about Travel Charge Card;

brainly.com/question/17639468

6 0
3 years ago
Energy/power management systems, kitchen appliances, smart televisions, baby monitors, fitness trackers, and personal health mon
boyakko [2]

Energy/power management systems, kitchen appliances, smart televisions, baby monitors, fitness trackers and personal health monitor are examples of internet of things.

What is meant by Internet of Things?

The Internet of Things (IoT) is known to be a term that connote the network of physical objects that are placed on or have sensors, software, etc.

Its involves technology that allows to add a device to an inert object such as plant electronic systems, roofs, lighting, that can measure environmental parameters, generate associated data and transmit them through a communications network.

Therefore, the Option C is correct.

Missing options "Client-server systems Servers Internet of Things None of the above"

Read more about Internet of Things

brainly.com/question/19995128

#SPJ1

THANKS

0

0.0

(0 votes)

Unlocked badge showing two hands making the shape of heart over a pink circle

Found this answer helpfu

5 0
2 years ago
Which part of the network communication process is responsible for sending and receiving data to and from the network media?
Whitepunk [10]

Answer:

Network Interface

Explanation:

Network interface is a piece of hardware or software that interfaces between two or more pieces of equipment or protocol layers in the computer network.

To do this, the computer needs a network interface card (NIC).

Ths NIC controls the wired and wireless connections of a computer to exchange information with other computers and the Internet.

4 0
3 years ago
Whats the answer? true or false <br><br><br> I accidentally clicked false.
Anarel [89]

Answer:

false i think

Explanation:

6 0
3 years ago
Read 2 more answers
Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
Zanzabum

Answer:

/*

Student: Hugo Meza

Date: February 15, 2019

Description: This program mimic the cat command from Linux. Checks whether the source file

has the right permissions, and then writes in the console its content.

*/

#include <stdio.h>

#include <fcntl.h>

#include <unistd.h>

#include <errno.h>

int hasPermission(char *filepath){

int returnval;

// Check file existence

returnval = access (filepath, F_OK);

if(errno == ENOENT){

printf ("%s does not exist\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n", filepath);

return 0;

}

// Check read access

returnval = access (filepath, R_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

// Check write access

returnval = access (filepath, W_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

return 1;

}

int main(int argc, char* argv[]){

if(!argv[1]){

printf("Error. Specify file to open\n");

return 0;

}

int fd;

char *fp = argv[1], content[fd];

if(hasPermission(fp) == 0)

return 1;

fd = open(fp, O_RDONLY);

int bytes = read(fd,content,sizeof(content)-1);

write(1, content, bytes);

close(fd);

return 0;

}

Explanation:

7 0
3 years ago
Other questions:
  • Which track-type can be used to control the master output levels of output and bus paths? Hint: When assigned to an active outpu
    10·1 answer
  • A lead views a specific page on your website, say, your case study page. You then send targeted follow-up content like one of yo
    14·1 answer
  • In a complex system, many subsystems interact with one another. How do these systems interact in terms of inputs and outputs?
    10·1 answer
  • Any one have a snnaap chhhaatt if so i need help with something n there
    15·2 answers
  • In the sentence below, identify the proofreader's marks used.<br><br>Check my answer please :)
    14·1 answer
  • Can anyone help???
    6·2 answers
  • Which type of digital picture is made by strong individual pixel value
    11·2 answers
  • Hi I'm new to Brainly anyone wanna be my frnd​
    15·1 answer
  • How to reset windows 7 password without logging in
    14·2 answers
  • Question # 9
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!