1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harman [31]
3 years ago
6

The ________ marker is the character that marks the end of a file and is automatically written when the file is closed.

Computers and Technology
1 answer:
Stella [2.4K]3 years ago
4 0

The EOF marker is the character that marks the end of a file and is automatically written when the file is closed.

You might be interested in
1. What is a digital networking app?
koban [17]
Digital networking is building relationships through social media. Just like traditional networking is an ongoing thing, in the digital world, you read people's posts, comment and share them. You interact and again and again.
4 0
3 years ago
Read 2 more answers
Explain why the control bus is not a bus.
slava [35]
Cause a control bus is a computer bus and controlled by a computer while a bus is controlled by a driver
3 0
3 years ago
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Chef is an orchestration tool?<br> Yes or No
nlexa [21]
I believe its yes. you can just look it up 

5 0
4 years ago
Read 2 more answers
Switches: Select one:
const2013 [10]

Answer:

b. connect two or more network segments that use different data link protocols

Explanation:

A switch is an analog device that allows to interconnect networks, it is possibly one of the devices with a higher level of scalability. It is important to clarify that a Switch does not only provide connectivity with other networks, nor does it provide connectivity with the Internet, for this purpose a router is necessary.  

6 0
4 years ago
Other questions:
  • How much cell phone data does the average person use a month
    9·1 answer
  • What’s the keyboard command I will allow you to copy text
    11·2 answers
  • What does an operating system do?
    11·2 answers
  • What is the decimal equivalent of the largest binary integer that can be obtained with
    9·1 answer
  • Jeffery wants to locate reliable academic information on the effects of global warming and ways to conserve energy. What is the
    5·1 answer
  • Write a method called makeStars. The method receives an int parameter that is guaranteed not to be negative. The method returns
    6·1 answer
  • Which among the following choices is correct based on the two statements listed below? Statement 1: When the lexical analyzer sc
    12·1 answer
  • The primary purpose of an operating system is: To provide a software interface between the hardware and the application programs
    11·1 answer
  • Why is it important to ensure that DNS Servers have been secured before implementing an e-mail system
    7·1 answer
  • Time management is the ability to use time effectively.
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!