Cal command is a calendar command in Linux which is used to see the calendar of a specific month or a whole year and enter a command, using output redirection (>), to output of the date command to a file called todaysdate.
<h3>What is cal command?</h3>
cal is a command- line utility on a number of computer operating system which includes Unix, Plan 9, Inferno and Unix - like operating system such as Linux that prints an ASCII calendar of the given month or year.
cal command is generally stands for calendar and the function of cal command is to display a simple calendar. The example of cal command is cal sep 1752.
Therefore, Cal command is a calendar command in Linux which is used to see the calendar of a specific month or a whole year and enter a command, using output redirection (>), to output of the date command to a file called todaysdate.
Learn more about cal command here:
brainly.com/question/22970860
#SPJ4
Answer:
1. Perpetration of violence
2. Breach of privacies
3. Replacement of human labor
4. National threats
5. Devotion of excessive time to technologies
Explanation:
The advent of science and technology have come with lots of benefits to man. Some of these benefits include, the invention of phones, electricity, the internet and social media, satellites, drones, etc. However, science and technology have been misused in the following ways;
1. Perpetration of violence: Weapons of war have caused the mass destruction of more people than was obtainable before. To aid these activities the fast means of communication and transportation cause seamless operations.
2. Breach of privacies: People with technical knowledge have the ability to intrude into the privacies of others. They can obtain information that was not originally meant for them.
3. Replacement of human labor: Machines and equipment have reduced the number of humans that were gainfully employed prior to the advent of these technologies.
4. National threats: Nations and governments now threaten their counterparts with the deployment of missiles. These attitudes aid international conflicts.
5. Devotion of excessive time to technologies: Teenagers most especially have developed an overdependence on technologies. A lot of time is now spent on phones, thus causing the neglect of social relationships.
Answer:
Micro Service is a technique used for software development. In micro services structure, services are excellent and arrange as a collection of loosely coupled. API Gateway helps in developing micro services quickly.
Explanation:
The API gateway is the core of API management. It is a single way that allows multiple APIs to process reliably.
Working:
API gateway takes calls from the client and handles the request by determining the best path.
Benefits:
Insulated the application and partitioned into micro services.
Determine the location of the service instances.
Identify the problems of services.
Provide several requests.
Usage:
API stands for application program interface. It is a protocol and tool used for building software applications. Identify the component interaction and used the Graphical Interface component for communication.
1) Blog - A blog is a discussion style site used by non-technical (and technical users) users for creating personal web pages. Blogs are similar to an online personal diary and simple to use.
Use of Blog: we can use a blog to convey messages about events, announcements, news, reviews, etc.
2) 5 websites that provide blog service:
1.WordPress
2.Blogger
3.Tumblr
4.Weebly
5.Just
3) Difference between web page and website:
{Webpage}
•Webpage consists of content regarding a single entity type.
•A direct URL link or a website can be used to access it.
•A combination of webpages is created using HTML and CSS.
{Website}
•Website constitutes content regarding several entities.
•A domain address is used to access it.
•Information is in HTML language.
4) Once the blog is ready for use, we need to submit/publish the content so that others can view. This process is called posting content.
Answer:
The Guardian
Explanation:
PRISM is a code name for a program under which the US National security Agency collects internet communications from various US Internet companies.
PRISM was publicly revealed when classified documents about the program were leaked to journalists of The Washington Post and The Guardian by Edward Snowden (as a NSA contractor) during a visit to Hong Kong . The leaked documents included 41 power point slides , four of which are published in news article.
Snowdown's subsequent disclosures included statement that government agencies such as the UK's GCHQ also undertook mass interception and tracking of internet and communication data.