Questions LLC
Login
or
Sign Up
Ask a New Question
Computer Science
Page 6
Questions (2,484)
14. The owner of the process can lower and increase the priority of the running process they own.
a) True b) False
1 answer
asked by
Anonymous
67 views
13. The directory contains information about processes.
a) /snap b) /etc c) /var d) /proc e) /process f) /opt
1 answer
asked by
Anonymous
59 views
12. Sed stands for simple editor.
a) True b) False
1 answer
asked by
Anonymous
48 views
9. Awk operations are:
a) Scan a file line by line b) Split each line into fields c) Compare input line/fields to pattern d) None
1 answer
asked by
Anonymous
74 views
8. The ______ Command can be used to change the priority of a running process.
a) Alter b) Priority c) Renice d) Nice e) Run f)
1 answer
asked by
Anonymous
89 views
4. When you run a program or execute a Linux command you have created a process.
a) True b) False
1 answer
asked by
Anonymous
65 views
3. The following sed command can be used to clean up files by removing empty lines from the content of the Sed_File.txt file:
a)
1 answer
asked by
Anonymous
97 views
2. The following sed command removes the first 10 lines from a file:
a) Sed ‘1.10d’ < filename b) Sed ‘/1,10/d’ <
1 answer
asked by
Anonymous
79 views
29. The REGEX asterisks (*) character has exactly the same meaning as the Globbing (wildcard) asterisks (*) character.
a) True b)
3 answers
asked by
Anonymous
85 views
27. All of the following can be used to identify a system account except ______?
a) Id between 1 and 499 b) Absence of a home
1 answer
asked by
Anonymous
83 views
24. The following environment variable stores the exit status of the last executed command:
a) $$ b) #* c) $# d) $?
1 answer
asked by
Anoymous
73 views
20. The following grep command will search the f.txt file for lines containing any number of spaces (at least one space must be
1 answer
asked by
Anonymous
93 views
19. The /etc/passwd file is an example of a flat file database.
a) True b) False
1 answer
asked by
Anonymous
63 views
17. The following environment variable is responsible for the appearance of the shell command prompt.
a) PROMPT b) PATH c) PS1 d)
1 answer
asked by
Anonymous
87 views
16. When you enclose a command between two _______, the shell replaces the command with the output of the command (Command
1 answer
asked by
Anonymous
101 views
14. The following grep command will search the f.txt file for all lines containing any stand-alone three digit number.
a) Grep
1 answer
asked by
Anonymous
89 views
12. All bash variables are integers by default.
a) True b) False
1 answer
asked by
Anonymous
61 views
8. The following command allows users to execute commands as root users:
a) Root b) Asroot c) Su d) Sudo
1 answer
asked by
Anonymous
70 views
7. A question mark (?) is a REGEX character that is used to describe any single character.
a) True b) False
1 answer
asked by
Anonymous
74 views
1. The following grep command will search the f.txt file for lines start with either upper- or lower-case character w and end
1 answer
asked by
Anonymous
88 views
What is the grep command will search the f.txt file for lines start with either upper or lower case character w and end with a
1 answer
asked by
Anonymous
77 views
Explain a insertion
1 answer
asked by
Marjolyn
70 views
What is the difference between a flow diagram with input, rule, and output and a flow diagram with the combination of Basic
2 answers
asked by
Lethokuhle
108 views
identify and illustrate the following: Input; Rule,
Output
3 answers
asked by
Lethokuhle
79 views
The number of arrows key on a keyboard are
2 answers
asked anonymously
41 views
Which of these computer languages can only be run without modification
A) assembly B) high level C) low level D) program
2 answers
asked anonymously
51 views
Which of these computer languages can only be run without modification
2 answers
asked anonymously
120 views
Which of the following describes the operating system?
(1 point) Responses It commands and controls all of the hardware and other
2 answers
asked anonymously
191 views
Multiple Choice
Which of the following is not an example of malicious code? (1 point) Responses Trojan horse Trojan horse worm
2 answers
asked by
two trucks
145 views
What is SQLs?
2 answers
asked by
Ayansa Dabesa soboka
36 views
How many different keys are used for symmetrical encryption?
zero one two three
1 answer
asked anonymously
60 views
I will be giving answer here
11 answers
asked by
BlazeRodriguez
64 views
What are the two main goals of normalisation
2 answers
asked by
Freezer
77 views
In this problem, we want to do classification over a different training dataset, as shown in plot below:
2. (1) 1 point possible
4 answers
asked by
Lakshmi Priyanka Kosuru
424 views
Discuss about Object Identity in OODBMS.
2 answers
asked anonymously
50 views
Describe Object and Attributes in OODBMS.
2 answers
asked anonymously
48 views
Describe Object Oriented Data modeling and E-R diagramming.
2 answers
asked anonymously
50 views
Define and Discuss about object oriented DBMS
2 answers
asked anonymously
54 views
Discuss Object Oriented Database Design and Implementation.
2 answers
asked anonymously
88 views
Define and Describe Object Oriented Concepts (Abstraction, Encapsulation, and Information hiding).
4 answers
asked anonymously
53 views
Which of the following statements regarding processing is true?
2 answers
asked anonymously
41 views
Which of the following variable names is invalid in Python?
score_1 5score Score Sc0re
1 answer
asked by
idk
100 views
A function has to have one parameter.
true false
1 answer
asked by
idk
41 views
Jamaal has been staring at the same line of code over and over trying to find the syntax error that his IDE says is on that
3 answers
asked by
idk
136 views
Morgan says that it doesn’t matter what order you put the arguments in to call a function. Is she correct?
Yes, python will use
2 answers
asked by
idk
139 views
Morgan says that it doesn’t matter what order you put the arguments in to call a function. Is she correct?
1 answer
asked by
idk
97 views
What is the output of this program?
def cost(item1, item2): total = item1 + item2 cost(80, 70)
3 answers
asked by
idk
59 views
1. Encrypt this binary string into cipher text: 110000. Include in your answer the formula the decoder would use to decrypt your
1 answer
asked by
help me god pls
115 views
After you apply a transition, ________ appears below the slide in Slide Sorter view and below the slide number in the slide tab.
2 answers
asked by
D
52 views
1. Which of the following is NOT an example of malicious code?
D. spy gear 2. What is malware short for? C. malicious software 3.
3 answers
asked by
pan101
628 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (20)
Academic Subjects
Careers
College Majors
College/University
Curriculum
Degree Programs
Education
History and Technology
Information Technology
Programming
Science
Science and Technology
Science/Technology
Study Materials
Subject
Subjects
Technology
Technology and Computers
Technology and Computing
Writing