1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
13

Outside of a C program, a file is identified by its ________while inside a C program, a file is identified by a(n) ________. fil

e number, file name file name, file number name, address name, file stream object None of these
Computers and Technology
1 answer:
Alexxandr [17]3 years ago
4 0

Answer: name, file stream object

Explanation:

You might be interested in
The chief reason that family and friends are frequent targets of aggression is that
iris [78.8K]
The correct answer is letter D. they're convenient. The chief reason that family and friends are frequent targets of aggression is that (D) they're convenient. Aggression is he feeling of harmful in terms of social interaction with the intention or goal of damaging other individual. Family and friends have already made a big interaction between each other.
5 0
3 years ago
8.10 quiz edhesive A swap is: a variable used to find the smallest value in an array an algorithm used to find a value in an arr
zmey [24]

Answer:

A swap is: an algorithm exchanging two values stored in variables

Explanation:

I just did it and got it right

8 0
3 years ago
T F The exit function can only be called from main .
ElenaW [278]

Answer:

FALSE

Explanation:

The exit function is used to terminate or halt the process.

Syntax-

            void exit(int status)  

Exit function (exit()) can be used in any function not only main() and it will terminate your whole process.

<u></u>

<u>Example-</u> C Program

#include<stdio.h>

#include <stdlib.h>  

//  function declaration

float exitexample ( float x );                                

// Driver program

int main( )                

{

 float a, b ;

 printf ( "\nEnter some number for finding square \n");

  scanf ( "%f", &a ) ;

 // function call

 b = exitexample ( a ) ;                      

 printf ( "\nSquare of the given number %f is %f",a,b );  

/*This will not printed as exit function is in exitexample() function*/

}

float exitexample ( float x )   // function definition  

{

 exit(0);    //exit function

   float p ;

  p = x * x ;

return ( p ) ;

}

5 0
4 years ago
You can use a(n) ______________to store large amounts of customer data for a website.
BaLLatris [955]

You can use a(n) <u>database server; Databases, like MySQL</u><u> and PostgresSQL, are widely used to store data.</u>to store large amounts of customer data for a website.

<h3>What is the difference between POP3 and IMAP coursera?</h3>

POP3 can only download email to one local device. IMAP can only download email to one local device. POP3 is used for sending emails. IMAP can download emails onto multiple devices.

<h3>When would you use IMAP?</h3>

IMAP and POP are two methods to access email. IMAP is the recommended method when you need to check your emails from several different devices, such as a phone, laptop, and tablet.

To learn more about database server, refer

brainly.com/question/23752341

#SPJ4

5 0
2 years ago
Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
Karo-lina-s [1.5K]

AI-driven attacks caused sandbox technology to automate and introduce artificial intelligence learning. AI and machine learning can be used to fight against malware attacks.

<h3>Artificial intelligence, machine learning, and malware</h3>

Artificial intelligence (AI) refers to the ability of a PC to perform tasks done by humans due to the requirement of discernment.

Machine learning is a subdivision of (AI) based on the use of data and algorithms to mimic human learning.

Malware is malicious software generated by cybercriminals, which are capable of stealing unauthorized information.

Learn more about malware here:

brainly.com/question/399317

4 0
2 years ago
Other questions:
  • Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pag
    11·1 answer
  • Use this option to view your presentation as your audience will see it. a.File menu b.Play button c.Slide Show button d.Tools me
    6·2 answers
  • Select five system utility functions.
    11·1 answer
  • 1 megabyte is equal to 1024 gigabyte. True/False​
    11·2 answers
  • Write a program that prompts the user to enter a grade, which is aninteger in the range of 0 - 100. Using if statements, have th
    11·1 answer
  • All states that have altered judicial selection techniques in recent years have adopted some form of:
    10·2 answers
  • EASY What does the Backspace key do?
    6·1 answer
  • A good information that contains the facts necessary for decision makers to solve a problem is characterized by the __________.
    15·2 answers
  • What happens on your screen when you click on the eyedropper tool in Scratch? The background of your scene will become transpare
    7·1 answer
  • Which of the following is not a reason to choose a community college?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!