1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stepan [7]
2 years ago
11

Eter lacy (placy) has taken an extended leave from the company for personal reasons. however, he was working on a critical proje

ct code named white horse with several other employees. the project leader requested that you move any white horse documents in peter lacy's home directory to brenda cassini's (bcassini's) home directory. you're logged on as wadams. use the mv command to move files. you must log in as the root user to have the necessary permissions to move other people's files. in this lab, your task is to: switch to the root user using 1worm4b8 for the root user password. you must have root user permissions to move other people's files. move the following files in placy's home directory to bcassini's home directory. confid_wh projplan_wh when you're finished, use the ls command to verify the new location of the files
Computers and Technology
1 answer:
liraira [26]2 years ago
3 0

The Linux commands to be used in moving files include the following:

  • mv/home/placy/confid_wh/home/bcassini
  • mv/home/placy/projplan_wh/home/bcassini

<h3>What is a Linux command?</h3>

A Linux command can be defined as a software program (utility) that is designed and developed to run on the command line, so as to enable an end user perform both basic and advanced tasks by entering a line of text.

In this scenario, the Linux commands to be used in performing various tasks include the following:

  • Switch user (su), and then enter the password (1worm4b8).
  • Move (mv)/home/placy/confid_wh/home/bcassini
  • Move (mv)/home/placy/projplan_wh/home/bcassini
  • Use ls-l/home/bcassini to verify the new location files.

<u>Note:</u> You've to log in as the root user (placy) before you can move his files.

Read more on Linux commands here: brainly.com/question/25480553

#SPJ1

You might be interested in
This is used to copy information from cell to cell in the spread sheet
Kryger [21]

Answer:

D. Fill handle

Explanation:

Required

Which can be used to copy from cell to cell

(a); Means the current cell being selected in the spreadsheet program

(b): Used to fit all columns in the spreadsheet program. Usually, the columns are fitted based on their width.

(c): The vertical and horizontal lines that separate cells.

(d): This is used to copy from one cell to another, especially adjacent cells.

5 0
3 years ago
Protocols at which layer of the OSI model have the primary function of moving datagrams through an internetwork connected by rou
Vladimir [108]

Answer:

"Network layer" is the correct answer to the given question .  

Explanation:

The network layer is interconnected with different networks by providing permission to the network. This job is done by sending the packets in the network. The main aim of the network layer is to provide the logical addressing, routing, and fragmentation of packets.

The network layer is the layer of the OSI model whose primary function is moving the packets or datagrams in the internetwork which is connected by the routers.  

5 0
3 years ago
¿que significa “TTAQMMQMPDATLSPLNDTMGCCLFEQMMPQTEIUMDR” ?
OlgaM077 [116]

Answer: what

Explanation:

5 0
2 years ago
Read 2 more answers
Which file format produces a lock-down version of an access database? accdb accdb-be accde accdb-e
jek_recluse [69]

The file format that produces a lock-down version of an access database is called; ACCDE

<h3>How to Identify Access Database?</h3>

ACCDB files are the default Microsoft Access database format in Access 2007 and later versions while the ACCDE format is a read-only, compressed version.

Now, the file format that produces a lock down version of an access database is called ACCDE file which is a Microsoft Access Execute Only Database file used to protect an ACCDB file.

Read more about Access Database at; brainly.com/question/9745438

#SPJ1

8 0
1 year ago
Which of the following actions should you take when turning left at an intersection?
fomenos
The answer is B Okay good luck and dont...mess it up
8 0
3 years ago
Other questions:
  • 7 features of QBASIC
    6·1 answer
  • "what is the #1 resource used when researching a product online?"
    5·1 answer
  • Use the RSA cipher with public key n = 713 = 23 · 31 and e = 43. Encode the word "KING" into its numeric equivalent and encrypt
    15·1 answer
  • Ask the user to enter the number of elements in a list of numbers. Take in the numbers from the user and then output the list th
    6·1 answer
  • In windows xp, which control panel icon should you choose if you would like to customize your system for left-handed use?
    7·2 answers
  • Why is it important for software developers to study Human-Computer Interaction? to make sure a user interface is easy to use, w
    10·2 answers
  • The equation x + y2-4x+2y=b describes a circle.
    8·1 answer
  • HELP!!! Bad things about Helen Keller. I'm doing a debate and i need to prove that Steve Jobs is better than Helen Keller!!
    14·1 answer
  • / Looks up author of selected books
    15·1 answer
  • List and briefly define the four main elements of a computer.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!