In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:

Answers

Answer 1

Question Completion with Options:

O tabs

O comma (,)

O colon (:)

O backtick (')

Answer:

In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:

O tabs

O comma (,)

O colon (:)

Explanation:

A UNIX/Linux data and configuration file is a local program file that controls the operation of the program.  Such files are usually static and are not created to be in executable binary. The files are stored in subdirectories. Backticks are not used to separate fields.  But tabs, commas, and colons can be freely used.  Configuration files, which are coded, provide the required parameters and initial settings to operate computer applications.  Data files are not executable like configuration files but are used by applications as input and output data to be read or viewed.


Related Questions

A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised

Answers

Answer:

computer.

Explanation:

it uses data that is labeled to train.

Which of the following is true for creating a new file?

a. ifstream objects do not create a new file.
b. create a file with the same name as an existing file, you will be prompted to rename your new file.
c. files cannot be created using the fstream library
d. None

Answers

Answer:

create a file with the same name as an existing file ,you will be prompted to rename your new file

what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?​

Answers

1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...

3.Obtain permissions when posting videos or 4.images of others on your networks. ...

Scrub your accounts. ...

5.Password diligence. ...

Spread love, not hate.

Which terms means device that converts one voltage to another ?

Answers

Answer:

I believe it is an adapter

Explanation:

An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

5 Write full forms of the following: CPU b. MHz с. СВТ d. CAI e. ICU f. POS a. Write suitable technical term for the following statements. The continuously working capacity of computer without loos its speed and accuracy. b. The computer terminology, in which output is determined accord to the input The computer device used in hospitals that helps to main heartbeat of the patient. Opiemak The collection of eight bits or two Nibbles. C. I byte d. ng School Level Computer Science - 6​

Answers

Answer:

CPU = Central prossing Unit

is there similarities between plagiarism and software piracy? explain.​

Answers

PlagiarismPlagiarism means using someone else's ideas or words without crediting source.PiracyPiracy is unauthorized use, reproduction, or sharing of copyrighted material.

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?


LAN


PAN


WAN


MAN

Answers

Answer:

PAN

Explanation:

For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.

What are the PAN  network type is Marco using?

The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).

A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.

Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.

Learn more about network type here:

https://brainly.com/question/29515062

#SPJ2

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task

Answers

Question Completion with Options:

A. device flow correlation

B. simple detections

C. application blocking list

D. advanced custom detections

Answer:

The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:

C. application blocking list

Explanation:

The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks.  Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.

continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.

Write a program that accepts the lengths of three sides of a triangle as an input from the user: A, B, C

Validate the user input so that the user can only enter positive values for sides A, B, C. All three must be true:

A > 0
B > 0
C > 0

Answers

Answer:

The program in Python is as follows:

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

while A<=0 or B <= 0 or C <= 0:

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

print("Valid inputs")

Explanation:

Get input for A, B and C

A = int(input("A: "))

B = int(input("B: "))

C = int(input("C: "))

The loop is repeated until inputs for A, B and C are above 0

while A<=0 or B <= 0 or C <= 0:

Get input for A, B and C

   A = int(input("A: "))

   B = int(input("B: "))

   C = int(input("C: "))

Print valid inputs when user inputs are correct

print("Valid inputs")

31. Explain what the program does. Write out the output 20 PRINT "Hellooo00000000000, world!" 30 PRINT "I'm learning about commands in BASIC." 40 PRINT 'This text is being printed via the PRINT commarrd. 2 209​

Answers

o_num = input ("Please enter the amount of \"o\": ")

zero_num = input ("Please enter the amount of zeros: ")

i = 0

while i < o_num and i < zero_num:

repeat_o = "Hell" + o_num

repeat_zero = repeat_o + zero_num

i+=1

print (repeat_zero)

If every company is now a technology company, then what does this mean for every student attending a business college

Answers

Answer:

Explanation:

There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.

But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.

What Internet access method would be suitable for a business requiring a high bandwidth connection where no cabled options exist?

Answers

Answer:

Fiber Optic, it allows for speeds up to 1200 mbps

Explanation:

Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not transmitting data to the outgoing link and all of you want to browse internet and send packets of same size to the router. Consider the bandwidth of the outgoing link is20Mbps , packet size is 2500 bytes and the processing delay of each packet is
2μs . If your packet is queued at position eleven, calculate the delay after which your packet will be transmitted

Answers

format please? i cant understand

Output is the act of is the act of entering the data to the computer?​

Answers

Answer:

Output is the act of the computer display information based on your input

Explanation:

Funny thing is that output is the exact opposite of what you just described

I need someone to explain gor me python coding!

Answers

Answer:

Explanation:

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems

Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.

Answers

Answer:

c

Explanation:

write the full form of E-mail?​

Answers

Answer:

Electronic Mail. This is your answer.

You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available

Answers

Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

Explanation:

Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.

A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?

a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.

Answers

Answer:

C

Explanation:

definitely C you’re welcome

__________ makes the hardware usable, while __________ commands it to perform specific tasks. a.) The operating system, RAM b.) The CPU, RAM c.) The application software, the hard disk d.) The operating system, the application software

Answers

Answer:

a then c

Explanation:

Without an operating system you just have a pile of metal, and the program contains code, which is just a series of commands

Answer:

d.) The operating system, the application software

give one advantage of saving file in the same folder

Answers

Answer:

it's easier to find

Explanation:

things are much more organized

So you don’t have to go through many files

Give three reasons to use a hard drive as mass storage.

Answers

Answer:

With that in mind, let's take a look at five places where hard drives shine.

Backups and Archives. ...

Media Libraries. ...

Large Capacity Storage. ...

NAS Drives and Security. ...

RAID Arrays. ...

Other Uses.

12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the AcademicGroups table.

Answers

Answer:index(E3:H12,1)

Explanation:

Answer: =INDEX(AcademicGroups,1,1)

Explanation:

Use the INDEX function (fx) button and you will be provided two different arguments to choose from.

Select the argument: array,row,num,column,num

In the Array section, click the up-arrow and then highlight the range A2:G12 (this is the AcademicsGroups table).

In the Row_num section, enter the number 1

In the Column_num section, enter the number 1

Press OK

Hopefully the logic behind this, after seeing it, makes sense.

In the right situations, the use of multi-threads can allow for application speedup. Provide a small code example that illustrates how threads can be used to arrive at an appropriate result. Identify if there is a point where too many threads might impact performance of the application. g

Answers

Answer:

Explanation:

Threads allow an applications to run faster because they allow various tasks to run at the same time instead of doing one at a time and having to wait for one to finish before starting the next task. However, if too many threads are running at the same time, or a thread has a very large task or requires another task to finish before finishing its own then this can drastically impact performance. Mainly because too many resources are being used at a single moment. The following code is a small example of how threads work in Python.

import threading

import time

def thread_function(name):

   print("Thread {name}: starting")

   time.sleep(2)

   print("Thread {name}: finishing")

thread1 = threading.Thread(target=thread_function, args=(1,))

thread1.start()

time.sleep(1)

thread2 = threading.Thread(target=thread_function, args=(2,))

thread2.start()

thread2.join()

Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices

Answers

Answer:

name is a reserved word in JS and cannot be used as an identifier

Explanation:

From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()

(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.

Answers

Answer:

The answer is "True".

Explanation:

The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.

https://ref.surveyj.co/Oware111​

Answers

What is the link?

IS IT A HACKING LINK

Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in bytes, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)

Answers

Answer:

ArraySize = ($ - newArray)

Explanation:

Given

Array name: newArray

Type: DWORD

Required

The size of the array in bytes

The following formula is used to calculate the size of an array in assembly language.

Variable = ($-Array name)

So, we have:

ArraySize = ($ - newArray)

Where ArraySize is the variable that holds the size of newArray (in bytes)

Identify the statement about Windows tasks that is FALSE.


To launch an application, click the Windows icon, select "All Programs," and then click an application.


The boot process is the process for powering off a computer.


A common way to shut down the computer’s operating system is by using the Start menu.


Users log into their accounts on the Welcome screen, before Windows is ready to use.

Answers

The statement about Windows tasks that is FALSE is

The boot process is the process for powering off a computer.

According to the question, we are to discuss about Windows tasks and how it works as regards to the computer.

As a result of this we can see that  in launching an application;

we need to click on Windows iconselect "All Programs," click an application.

Therefore, The boot process is not the process for powering off a computer.

Learn more about Windows tasks .

https://brainly.com/question/1594289

The statement that is false is: The boot process is the process for powering off a computer, which is the second option. The boot process is actually the process of starting or powering on a computer, not powering it off.

The boot process refers to the sequence of events that occur when a computer is powered on or restarted. It is the process of starting up the computer's hardware and loading the operating system into memory so that it is ready for use. During the boot process, the computer's firmware (such as the BIOS or UEFI) performs a series of checks and tests to ensure that the hardware components are functioning correctly. It then searches for the operating system on connected storage devices, such as the hard drive or solid-state drive, and loads it into memory.

Learn more about the boot process here.

https://brainly.com/question/24355262

#SPJ6

Other Questions
solve for PP/15=20/25 Which activity is a way engineers can control erosion?O A. Testing a body of water near a building site to make sure that itcan support wildlifeB. Using protective barriers to hold the soil on sites exposed byconstruction activitiesC. Designing buildings that can be maintained using minimal waterand electricityD. Looking for soil that contains minerals that bind with particularpollutants The temperature in Buffalo, New York, was -2 F one day. This was 42 degrees warmer than the temperature in Nome, Alaska, on the same day. Find the temperature in Nome. Justify your answer by writing and solving an equation. pls I'll make the first to answer with equation get brainlyest What kind of rock is this?igneousWhere would this rock most likely be formed?To which group of rocks would this rock belong?Rocks can be classified based on texture. Thesize of the grains in a rock affects its texture.Coarse-grained rocks have large grains, and fine-grained rocks have small grains.Rocks formed from magma under Earth's surfacehave larger grains than rocks formed from lavaon Earth's surface. This is because magma coolsslower underneath the ground than it does aboveground. Best answer gets brainliest and 5 stars Dr. Ignaz Semmelweis was a Hungarian doctor investigating the deaths of women in hismaternity ward from childbed fever. Which statement below is a valid hypothesis made byDr. Semmelweis?O Doctors caused childbed fever.Midwives caused childbed fever.If doctors disinfect hands before delivering babies, then there will be less childbed fever.o If a woman goes into the hospital then she will die of childbed lever. Type the correct answer in each box. Use numerals instead of words. If necessary, use / for the fraction bar(s).Consider the equation below.[tex]3x^{3x-2}=81[/tex]To solve the given exponential equation, solve the linear equation [tex]3x-2=[/tex] A firm has inventory of $11,400, accounts payable of $9,800, cash of $750, net fixed assets of $13,125, long-term debt of $9,500, accounts receivable of $6,600, and total equity of $11,700. What is the common-size percentage for the inventory? 30 Points cuz I need help ASAP Write a class of complex numbers consisting of:-Properties: Real part of type double; Virtual part of type double.- Method: default constructor, 2-parameter constructor; Full setter, getter for each variable; the print() function prints SoPhuc as a string in the format a + bi, where a is the real part, b is the imaginary part-Write main() function: Create 2 SoPhuc objects Use class methods to enter information for 2 objects Use print() method to print information of 2 objects that have been created 1. 2076 Set B Q.No. 1 Read the following passage and answer the questions that follow: [5*3=15] There is quite a debate on whether or not computers have positively affected education. Some proponents of computers in school argue the fact that computers are vast in the supply of resources as well as the fact that computers dominate society and will continue to do so. Opponents of computers in education take the position of experiencing things actually, and not just on a computer screen, a reality versus virtual reality argument. In addition, there is the aspect of time involved with using a computer as opposed to interaction with actual living things. Computers have in many ways enhanced education but it has also weakened other skills taught in school as well. The first skill lost is obvious with the use of the word processing programmes today. Of course they are convenient for typing papers because of the neatness and uniformity they provide as opposed to hand writing. Computers also make it easy to correct mistakes without using white out or scratching out words. However, it is discouraging children to learn how to spell correctly, use correct grammar and in some word processing programmes use more vibrant and exciting words. Questions: a. According to the speaker, how is computer discouraging children? b. What do the opponents of computers claim? C. What advantages do computer typing have over handwriting? d. What do the proponents of computer argue? Summarize the passage in one sentence. 6. Who stated that matter is not composed of particles will mark brainliest!! y=0.0111x+2.7617 what is the x axis I need help ASAP!!! Please explain your answer Choose appropriate words to complete the paragraph below to explain the general trends shown in a predator-prey graph.Breathe, Muscles, Oxygen, Lactic, anaerobic respiration, Oxygen aerobic respiration, Break downAn increase in the prey population provides more food for the _________ , allowing more to survive and _________ . This is turn results in an _________ in the predator population. The larger predator population eats more prey organisms, causing a _________ in the prey population. The death rate of the prey is larger than its _________ rate. The reduced prey population can no longer support the large predator population. _________ for food increases, resulting in a _________ in the size of the predator population. Reduced predator numbers results in less of the prey population being killed. More prey _________ and reproduce so the prey population _________ again. The number 42 has the prime factorization 2.3.7. Thus 42 can be written in four ways as a product of two positive integer factors (without regard to the order of the factors): 1.42, 2 21,3 14, and 6. 7.Required:List the distinct ways the number 770 can be written as a product of two positive integer factors. A trader sold 90 oranges at 3 for GHC 0.75.How much did she get from selling all theoranges? If the United State President does not like a law, he can _____ it.A) vetoB) amendC) annexD) change What are targets for a business to achieve?A. ObjectivesB. Smart goalsC. Social enterprisesD. Profits