To update the demo account, click the setup button to create a new account called "demo" with the password "demo". Log in using these credentials.
To perform a wild copy, use the following commands:
```
cd /home/demo
cp *file* work/
ls work
```
To duplicate the "thismonth" file, use these commands:
```
cp thismonth letters/let1.doc
cd letters
cp let1.doc let2.doc
cp let1.doc let3.doc
ls
```
To copy and rename the files, use these commands:
```
cd ..
cp letters/let?.doc work/misc/
cd work/misc
mv let1.doc rpt1.doc
mv let2.doc rpt2.doc
mv let3.doc rpt3.doc
```
To move files using square brackets, use this command:
```
mv [23]* ../scripts/
```
To remove files starting with "r", use this command:
```
cd ../scripts
rm -i r*
```
To create a hard link called "biglink", use this command:
```
ln /home/demo/bigfile /home/demo/progs/biglink
ls -l /home/demo/bigfile
```
To create a relative soft link called "mylink", use this command:
```
ln -s ../thismonth /home/demo/progs/mylink
```
To create an absolute soft link called "mylink2", use this command:
```
ln -s /home/demo/thismonth /home/demo/progs/mylink2
```
To know more about wild copy, click here:
https://brainly.com/question/29486512
#SPJ11
1 point
If someone wanted a computer to store all of their movies which type of
Hard Drive would be better to get? *
Magnetic
SSD
Answer:
yes
Explanation:
it very big like my di- hope it helps
Can anyone please help me on these two questions it would really help xxx
Answer: No one can interpret or hack it.
Explanation:
Because there is nothing to hack.
take it from someone who hack their teachers laptop as a dare. It was so easy.
a language translator is a ???
Answer:
Explanation:
speech program
Answer:
hi
Explanation:
language translator is a program which is used to translate instructions that are written in the source code to object code i.e. from high-level language or assembly language into machine language.
hope it helps
have a nice day
Using the Date and Time dialog box, add an automatic date stamp to the header of the document.
Use the July 5, 2019 format, The time X it takes Professor Sawyer to drive to campus on a randomly selected day follows a distribution that is approximately Normal with mean 37 minutes and standard deviation 3 minutes. After parking his car it takes an additional 3 minutes to walk to his classroom and 2 minutes to start the computer. Then he is ready to begin class. Let T = the total time it takes Professor Sawyer to get to his classroom and be ready to begin class. Describe the shape, center, and variability of the probability distribution of T.
The probability distribution of T is described as follows:
Shape: normal.Center: mean of 42 minutes.Variability: standard deviation of 3 minutes.What happens to the distribution with the addition of the measure of 5?The shape of the distribution remains constant, hence it will remain normal.
Then we have to consider that the mean of a data-set is the sum of all observations divided by the number of observations. Each day, a measure of 5 minutes is added to the distribution, hence 5 is added to the mean of the distribution also.
The standard deviation of a distribution is the square root of the sum of the differences squared of each observation and the mean. As the mean is added by 5, as are each observations, the sum of the differences remains constant, hence the standard deviation also remains constant at 3.
More can be learned about probability distributions at https://brainly.com/question/28450969
#SPJ1
Write a VBA Function subroutine called Tax that takes a single argument gross Income of type Currency. It should calculate the tax on any income using the following tax schedule: (1) if income is less than or equal to $15,000, there is no tax (2) if income is greater than $15,000 and less than or equal to $75,000, the tax is 15% of all income greater than $15,000 (3) if income is greater than $75,000, the tax is 15% of all income between $15,000 and $75,000 plus 20% of all income greater than $75,000 Then write a Calc Tax subroutine that asks the user for his income, gets the function subroutine to calculate the tax on this income, and reports the tax in a message box
An example of formulated VBA code comprises a function called "Tax" that takes the gross income as an input and employs the given tax schedule to know the tax amount is given below.
What is the VBA Function?A function in VBA is one that is like that of a sub procedure, except that the former has the ability to provide an output value while the latter does not have this capability. A code fragment that can be invoked within the VBA Editor, saving one from having to repeat the same lines of code.
In order to make use of the code given, access the VBA editor within Microsoft Excel or other Office programs, generate a fresh module, and insert the code. Next, execute the "CalcTax" subroutine either by pressing F5 or by choosing Run from the menu bar.
Learn more about VBA Function from
https://brainly.com/question/29442609
#SPJ4
write technical terms for the following statements.
A) A collection of programs which make computer work.
B) A language processor that converts assembly language codes in to machine language.
C)Software that is the basic requirement of a computer.
D) The software which help to maintain the hardware and software.
E) Applications software that is designed for an organization.
F)The software which does not provide right to modify.
G) The binary code obtained after the translation of source code.
H) The application which is needs internet to access and update.
Answer:
A) software
B)assembler
C)operating system
D)system software
E)data base
F)software license
G)machine code
H)ONLINE shopping apps
Write a program that accepts a whole number as input, multiplies that number by 12, and then outputs the product.
Hint: Remember that to think about the data type that the user will input. How can you make sure that their input is entered as a number?
Explanation:
userInput = input("Enter Number")
try:
val = int(userInput)
except ValueError:
print("That's not an int!")
what will be the output for;
for i in range(1,6):
if i==3:
print('hello')
break
else:
print(i)
print('done')
The output for; for i in range(1,6): if i==3: print('hello') break else: print(i) print('done') the output for the given Python program is 001020340.
What is range () in Python?
The python range() function creates a collection of numbers on the fly, like 0, 1, 2, 3, 4. This is very useful, since the numbers can be used to index into collections such as string. The range() function can be called in a few different way.
The given program is as:i =0while i < 5print(i)i +=1if i==3 :breakelse:print(0)It will give the following as result 001020340Hence, the answer is 001020340.
Read more bout the python :
https://brainly.com/question/26497128
#SPJ1
A ball is at rest on top of a roof of a car.
Answer:
When it is in frictional force or in the action of movement varies the speed and if it will stop
Explanation:
If a object is in action a out side force is needed to make it start or stop
Describe a situation in which you would want to use integer division in a program. Then, write the line of code that would use integer division.
The description of a situation in which you would want to use integer division in a program is that they would give you the exact answer you want when performing addition, division, etc, and is more reliable than using floating point math.
What is Integer Division?This refers to the term that is used to describe the operator divides two numbers and returns a result and its symbol is %
The Program that uses an integer division is given below:
int a = 25;
int b = 5;
int c = a / b ;
System. out. println(c);
Read more about integer division here:
https://brainly.com/question/28487752
#SPJ1
What does D'Artagnan discover about Milady? d. That she has the mark of a criminal, the fleur- c. That she is secretly working for the queen. de-lis. b. That she is the wife of the Count of Rochefort. d. That she stole the diamonds from the queen.bl
Answer:
prolly b
srry need tha points
Explanation:
1. Identify about two to four different buine application in your organization (e. G. E-mail, order fulfillment, cutomer ervice, e-procurement, telehealth etc. ). Decribe which buine application are more amenable to cloud computing and why. If you already implemented cloud functionality for ome of the application, preent the reaon why you decided to move to the cloud. Identify which platform (e. G. Amazon AWS or Microoft Cloud) you would ue for cloud implementation
Four different buine application in your organization are MicsoSoft office 365 (Saas) for Email services, Oracle Netsuite (saas) for order fuifilment, Zen desk for customer service, vitro commerce
let us consider there is an organization That organization Consists of 100 employees.
It require Some business application like,
MicroSoft office 365 (Saas) for Email services
Oracle Netsuite (saas) for order fuifilment
Zen desk for customer service.
vitro commerce e-procurement solution for E - procurement and Aws (paas) for hardware and software solution.
All these business applications are amenable to cloud computing for the organization because of Cost-effectiveness,
steam line the flows of work and services
Time saving
unlimited storage
backup and Mobility.
The on -demand Self-service with advanced online
The term "use" refers to the advantages derived from an item or service. The "application" refers to the usage of the service or product to achieve the advantage in several domains.
Learn more about Application here:
https://brainly.com/question/28650148
#SPJ4
deshaun has to write a complex and lengthy year-end report, which is due by the end of january. which of the following computer tools will help deshaun schedule time to work on this into every business day? question 21 options: a database program a word processing program collaboration software an electronic calendar an outlining program
The best computer tool for Deshaun to utilize to plan time to work on the year-end report into each business day would be an electronic calendar. A digital calendar, sometimes known as an electronic calendar.
enables users to plan and arrange meetings, activities, and chores. It offers notifications and reminders to make sure that crucial deadlines are reached. Deshaun can utilize the digital calendar to schedule specific time each day to work on the year-end report and prevent scheduling conflicts. A digital calendar may also sync with different devices, so Deshaun can easily check his schedule while on the move on his phone or computer. Also, it is simpler to organize meetings and work together on projects when coworkers can use the same electronic calendar.
learn more about computer here:
https://brainly.com/question/21080395
#SPJ4
Which of the following computer tools will be the most helpful for Deshaun to schedule time to work on his complex and lengthy year-end report into every business day?
a) A database program
b) A word processing program
c) Collaboration software
d) An electronic calendar
e) An outlining program.
How to Print a
document
Answer:
Print a document in Word
1)Click File > Print.
2)To preview each page, click the forward and backward arrows at the bottom of the page. If the text is too small to read, use the zoom slider at the bottom of the page to enlarge it.
3)Choose the number of copies, and any other options you want, and click the Print button.
Answer:
Open the file in your computer by using Microsoft Word Or any other file opener then connect your printer you have to press ‘c t r l‚ and p then some instructions then select your printer select your page then click print
TRUE/FALSE. A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type.
The given statement "A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type." is false the Number data type is used for numeric values such as integers or decimal numbers.
The reason for using the Text or String data type is that the phone number format contains not only numeric digits but also special characters such as parentheses and dashes. These characters are part of the phone number's formatting and are not intended to be treated as mathematical values.
The Number data type is generally used for numeric values that can be used in calculations or mathematical operations, such as integers or decimal numbers. However, in the case of a phone number field, it is more appropriate to treat the data as text or a string of characters rather than a numerical value.
Learn more about Number data type: https://brainly.com/question/30154944
#SPJ11
list any four e-commerce website
Answer:
Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.
eBay. ...
Walmart. ...
Etsy. ...
Home Depot. ...
Target. ...
Best Buy. ...
Wayfair.
Answer:
I'm sorry is this a question?
how can i help?
Explanation:
You need to identify the manufacturer of a network interface. Where will you look for this information?The first three octets of a Media Access Control (MAC) addressThe last octet of a Media Access Control (MAC) addressThe first octet of a Media Access Control (MAC) addressThe fourth octet of a Media Access Control (MAC) address
To identify the manufacturer of a network interface. We will look to the first three octets of a Media Access Control (MAC). The correct option is a.
What is a network interface?The first six digits of a MAC address, known as OUI, are typically used to identify the manufacturer (Organizational Unique Identifier).
An Ethernet or network adapter over any given network is given a media access control address (MAC address), which is viewed as a distinctive identifier of sorts.
It should be noted that any of their registered vendors have received these MAC prefixes from the IEEE Registration Authority Committee. The rightmost six numbers stands for the Network Interface Controller.
Therefore, the correct option is a, The first three octets of a Media Access Control (MAC).
To learn more about network interface, refer to the link:
https://brainly.com/question/28207436
#SPJ1
write a program that allows the user to enter 10 songs and their artists into a playlist and will sort the entries by artist order. the program should use a 10 element array of structure objects that holds two string variables: artist and title. once the data has been read in and stored, it should sort the entries in ascending order by artist. it should then display the sorted array with appropriate headings.
Here's an example program in C++ that allows the user to enter 10 songs and their artists into a playlist, sorts the entries by artist order, and displays the sorted array:
#include <iostream>
#include <algorithm>
#include <string>
using namespace std;
// Define a structure to hold song data
struct Song {
string artist;
string title;
};
int main() {
// Define an array of 10 Song objects
Song playlist[10];
// Prompt the user to enter the song and artist for each playlist entry
for (int i = 0; i < 10; i++) {
cout << "Enter artist for song " << i + 1 << ": ";
getline(cin, playlist[i].artist);
cout << "Enter title for song " << i + 1 << ": ";
getline(cin, playlist[i].title);
}
// Sort the playlist entries by artist in ascending order
sort(playlist, playlist + 10, [](const Song& s1, const Song& s2) {
return s1.artist < s2.artist;
});
// Display the sorted playlist with appropriate headings
cout << "\nSorted Playlist by Artist\n";
cout << "-------------------------\n";
for (int i = 0; i < 10; i++) {
cout << "Artist: " << playlist[i].artist << endl;
cout << "Title: " << playlist[i].title << endl;
cout << "-------------------------\n";
}
return 0;
}
In this program, we first define a Song structure to hold the artist and title for each playlist entry. We then define an array of 10 Song objects to store the playlist entries.
We prompt the user to enter the song and artist for each playlist entry using a loop that iterates 10 times. We use the getline() function to read in the user input as a string.
Next, we use the sort() function from the <algorithm> library to sort the playlist entries by artist in ascending order. We use a lambda function as the third argument to the sort() function to specify the comparison logic for sorting the Song objects by artist.
Finally, we display the sorted playlist with appropriate headings using another loop that iterates 10 times. We output each Song object's artist and title fields and a separator to visually distinguish each playlist entry.
For more question on program click on
https://brainly.com/question/23275071
#SPJ11
All of the following are true about in-database processing technology EXCEPT Group of answer choices it pushes the algorithms to where the data is. it makes the response to queries much faster than conventional databases. it is often used for apps like credit card fraud detection and investment risk management. it is the same as in-memory storage technology.
All of the aforementioned are true about in-database processing technology except: D. it is the same as in-memory storage technology.
What is an in-database processing technology?An in-database processing technology can be defined as a type of database technology that is designed and developed to allow the processing of data to be performed within the database, especially by building an analytic logic into the database itself.
This ultimately implies that, an in-database processing technology is completely different from in-memory storage technology because this used for the storage of data.
Read more on database here: brainly.com/question/13179611
#SPJ1
Web technologies like Flash, CSS, Java, and HTML often depend on APIs to accomplish what task?
In Programming, web technologies like the front end part e.g Flash, CSS, Java, and HTML depends on back end APIs for task like data persistence, sending and getting data e.g post and get request in summary perform CRUD(Create, read, update and delete) operations
The development of web application is basically divider into two
The front end, done basically with technologies like HTML CSS, JavaScriptBack end, this can be done using Python, C#, Java, or any suitable languageTh front end depends on the back end for sending and retrieving information
Learn more:
https://brainly.com/question/8391970
1. What is an AUP? (1 point)
O the abbreviation for the school administrator in an online education environment
a document outlining what is acceptable behavior when using the Internet for schoolwork
a policy outlining the proper formatting to use in Microsoft Office documents for online education
O a short course students can take to understand the school's policies better
The term AUP is option B: a document outlining what is acceptable behavior when using the Internet for school work.
What is an AUP?An Acceptable Use Policy (AUP) is a set of rules and guidelines that outline the appropriate and responsible use of a school's computer equipment, networks, and other digital resources. It is designed to protect the school's technology infrastructure, as well as the privacy and security of students, teachers, and other users.
An AUP may include guidelines for a variety of activities, such as:
Accessing and using the school's computer networks and equipmentUsing the Internet for schoolwork, research, and communicationProtecting personal privacy and security onlineUsing social media and other online communication toolsDownloading and installing software and appsTherefore, based on the context of the above, i can say that an AUP may also specify the consequences for violating the terms of use, which can include disciplinary action, revocation of access to digital resources, and other penalties.
Learn more about Acceptable Use Policy from
https://brainly.com/question/24951641
#SPJ1
refer to the exhibit. a network administrator is connecting a new host to the service lan. the host needs to communicate with remote networks. what ip address would be configured as the default gateway on the new host?
A new host is being added to the service lan by a network administrator. The host needs to talk to distant networks. On the new host, the default gateway would be set to the IP address 10.27.14.148.
If a host's default gateway address is configured incorrectly, which of the following will take place?A machine with the wrong default gateway set up can talk to hosts on its own network segment. It will, however, be unable to communicate with hosts on some or all distant networks.
How are data packets forwarded to their destinations by intermediary devices like routers?If the router has a route, it will send the packet to the next-hop router that provides a connection to the destination network.
To know more about networks visit :-
https://brainly.com/question/24279473
#SPJ4
why might a patient be required to go to a rehabillition center after a hosptial stay
Answer:
They'd need to get care from someone who speacialized in their illness, surgery recovery or injury
Explanation:
if theyre recovering from a serious illness, surgery, or injury and require a high level of specialized care that generally cannot be provided in that setting
Sami is creating a web page for her dog walking business. Which item will set the theme for her page? Background color Heading color Link color Text color
Answer:
A Background color
Explanation:
Antes de conectar un receptor en un circuito eléctrico, ¿qué precauciones debemos tomar para evitar riesgos y hacer que el dispositivo funcione correctamente?
Answer:
Antes de conectar un receptor en un circuito eléctrico, es necesario corroborar que el dispositivo que se va a conectar soporte la misma corriente de voltaje que la del circuito eléctrico. Así, si el circuito tiene un voltaje de 110 voltios, el dispositivo debe tolerar dicha medida; si por ejemplo el circuito tiene un voltaje de 220 voltios y se conecta un dispositivo que tolera 110 voltios, se producirá un cortocircuito que dañará definitivamente el dispositivo, ademas de poder causar accidentes domésticos como el corte del suministro eléctrico o incluso incendios.
use a row level button to collapse worksheet rows to display only subtotals and the grand total. then, use a show details button to display individual records for the eastern region subcategory of data (the top shoe details ( ) symbol)
To use a row level button to collapse worksheet rows and display only subtotals and the grand total, follow these steps:
1. Select the rows that you want to collapse, which contain the subtotals and the grand total.
2. Right-click on the selected rows and choose "Group" from the context menu.
3. This will collapse the selected rows and display only the subtotal and grand total rows. You can click the minus (-) sign next to the subtotal row to collapse the details further.
4. To create a show details button for the eastern region subcategory of data, first, insert a new button shape or symbol into the worksheet.
5. Right-click on the button and select "Edit Text" to add the text "Show Details" or the top shoe details ( ) symbol inside the button.
6. Right-click on the button again and choose "Assign Macro" from the context menu.
7. In the Assign Macro dialog box, select the macro or function that will display the individual records for the eastern region subcategory of data. If you don't have a macro, you can create one using VBA (Visual Basic for Applications).
8. Click "OK" to save the changes and close the dialog box.
9. Now, when you click the show details button, it will execute the assigned macro or function, which will display the individual records for the eastern region subcategory of data.
Remember to customize the steps according to the specific software or spreadsheet program you are using.
To know more about individual visit:
https://brainly.com/question/32647607
#SPJ11
Katarina is deciding whether to buy a desktop or a laptop computer. What will most likely help Katarina make her decision?
Laptops have touch screens, while desktops require a keyboard.
Laptops use simple software, while desktops are more complex.
Laptops are portable devices, while desktops remain in one place.
Laptops have more memory, while desktops have limited disk space.
Answer:
C is your answer. Good luck on the test!
Explanation:
What are some potential challenges that society will face given the digital revolution? You may want to think particularly of the news industry. Discuss how these challenges could impact young people such as yourself.
Answer:
Some said that technology causes more problems than it solves. ... Others said humans' uses and abuses of digital technologies are causing ... Highly technological societies have to be iterative if they hope to ... where we believe we can tell honestly delivered information from fake news and disinformation.
hope this helps...
Explanation:
What of the following are a result of writing programs as one long sequence structure? O Duplicated code makes the program faster to write. O Having a long sequence of statements makes it easy to find errors. O If parts of the duplicated code have to be corrected, the correction has to be made many times. O It does not make use of decision structures.
As a result of coding programs as one lengthy sequence structure, if portions of the duplicated code need to be corrected, the correction must be made numerous times.
What in programming is a sequence structure?A sequence structure consists of one or more subdiagrams, also known as frames, that run one after the other. The execution order of nodes is determined by data dependency within each frame of a sequence structure, much like in the rest of the block diagram.
What kind of loop structure keeps the code repeating?When a condition is no longer met, a while loop runs a block of code an undetermined number of times. A block of code is repeated a predetermined number of times in a for loop, on the other hand.
To know more about programs visit:-
https://brainly.com/question/14010931
#SPJ1
(cisa exam, adapted) to ensure confidentiality in an asymmetric-key encryption system, knowledge of which of the following keys is required to decrypt the receive message? private public
To ensure confidentiality in an asymmetric-key encryption system, the knowledge of the private key is required to decrypt the received message. In an asymmetric encryption system, also known as public-key encryption, a pair of keys is used: a private key and a public key.
The public key is used for encryption, and anyone can have access to it. It is used by the sender to encrypt the message before sending it to the recipient. However, the encrypted message can only be decrypted using the corresponding private key, which is kept secret by the recipient.
Therefore, to decrypt the received message and ensure confidentiality, the recipient must possess the private key associated with the public key used for encryption.
Learn more about Encryption here -: brainly.com/question/4280766
#SPJ11