1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zepelin [54]
3 years ago
14

When you started the vi editor, you forgot to specify the name for the new file you are creating. To save steps next time, how c

an you specify the name of a new file when you first start vi
Computers and Technology
1 answer:
zysi [14]3 years ago
8 0
Vi ‘filename’
For example file called main.py
vi main.py
You might be interested in
Write an application that displays the sizes of the files lyric1.txt and lyric2.txt in bytes as well as the ratio of their sizes
viva [34]

Answer:

#include<iostream>

#include<fstream>

using namespace std;

int main() {

  ifstream file_one("lyric1.txt", ios::binary);

  ifstream file_two("lyric2.txt", ios::binary);

  file_one.seekg(0, ios::end);  // retrieving file size of lyric1.txt file

  file_two.seekg(0, ios::end);  // retrieving file size of lyric2.txt file

  // converting the binary file size to an integer.

  int fileOne = file_one.tellg();

  int fileTwo = file_two.tellg();

  cout<<"Size of the lyric1.txt is"<<" "<< fileOne<<" "<<"bytes";

  cout<<"Size of the lyric2.txt is"<<" "<< fileTwo<<" "<<"bytes";

  cout<< fileOne <<" : "<< fileTwo;

Explanation:

The source code gets the file size of two word files and displays them in bytes and also displays the ratio of both files.

4 0
3 years ago
What are the ASE special certifications?
kykrilka [37]

Answer:

It is The National Institute for Automotive Service Excellence.

Explanation:

8 0
3 years ago
Read 2 more answers
Which of the following are features of the HTTPS protocol?
alexandr1967 [171]

Answer:

a and c

Explanation:

4 0
3 years ago
The the concept of plug-and-play is demonstrated by which of the following scenarios
Vitek1552 [10]

Answer:

What are the Scenarios

I will update this when you give us them

Explanation:

5 0
3 years ago
Read 2 more answers
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
Other questions:
  • Select the correct answer.
    8·2 answers
  • Your friend wants to know about Microsoft Expression Web 4. Which of the following terms will you use to describe Microsoft Expr
    5·1 answer
  • 30 POINTS!!
    15·2 answers
  • Do URLs identify the location of Web content?
    8·2 answers
  • Where could an identity theft access your personal information?
    9·2 answers
  • How do u make a bored builder
    8·2 answers
  • Function of C:\&gt;DIR*.doc/p​
    5·1 answer
  • How do web bugs invade a person's privacy?
    7·1 answer
  • A pointer can be used as a function argument, giving the function access to the original argument.
    8·1 answer
  • Which of the following controls computer memory?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!