1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
7

What command would you use to list the text files in your

Computers and Technology
1 answer:
frez [133]3 years ago
4 0
<span>After going to the CS lab someone helped me figure out the problem. I needed to be in a certain working directory at first, and I wasn't. After switching to that directory all I needed was the command:
       ../UnixCourse/fileAsst/*.txt
       and that took care of it for me. Thanks to everyone that helped and I hope this helps someone else.</span>
You might be interested in
Josie, your best friend, is having a huge Sweet Sixteen party. She has designated you to address all 100 of the envelopes (using
marysya [2.9K]

You add all the addresses into excel and and do mail-merge with the invitation. Adding the 100 addresses is probably a lengthy process but once this is complete you can just add on addresses and once a year or whenever you have to mail something to everyone, it's  a only mouse-click.

4 0
3 years ago
The picture that graphically represents the items you use in Windows is called a/an
Novosadov [1.4K]
The answer to this is Bulls icon
6 0
3 years ago
What is a semiconductor
Elis [28]
A semiconductor material has an electrical conductivity value falling between that of a conductor, such as metallic copper, and an insulator, such as glass. Its resistivity falls as its temperature rises; metals behave in the opposite way. I hope this helps and have a great day! (Also brainliest would be appreciated but you don’t have to) :)
7 0
3 years ago
Read 2 more answers
Attacking systems by exploiting otherwise unknown and unpatched vulnerabilities is also known as:
Nostrana [21]

Answer:

Zero-day exploits

Explanation:

Zero-day exploits refers to recently found vulnerabilities in a computer software program that has been in existence but was hitherto not known and addressed by the software security experts, however, these vulnerabilities were known to hackers. While the existence of these "loop-holes" in the software can go on unnoticed for several years, hackers can take advantage of it to cause harm to the computers' programs and data.

When these attacks occur, it is called a zero-day because the attack took place on the very day that the loop-hole was discovered in the software. So exploitation has already taken place before a fix is carried out.

5 0
3 years ago
A class member function that automatically initializes the data members of a class is called?
____ [38]

A class member function that automatically initializes the data members of a class exists called a constructor.

<h3>What is meant by member function?</h3>

Operators and functions that are designated as members of a class are known as member functions. Operators and functions declared with the friend specifier are not included in member functions. These are referred to as class pals. Together, data members and member functions describe the characteristics and actions of the objects in a Class. Data members are the data variables, and member functions are the functions used to control these variables.

In C++, there are typically five different types of member functions available. Specifically, friend member functions and basic, static, const, inline functions. Classes-only functions are member functions. Any private, protected, or public member of its class may be accessed using the public member function. Any member function of a class, not just the public ones, has access to every single other member that has been declared inside the class. so are easy to programme.

Hence, A class member function that automatically initializes the data members of a class exists called a constructor.

To learn more about member functions refer to:

brainly.com/question/15554910

#SPJ4

3 0
2 years ago
Other questions:
  • The purpose of the ________ element is used to configure the main content of a web page document.
    5·1 answer
  • Finding information on the web was made easier by _____________, which provide on-screen menus, making navigation of the web as
    12·1 answer
  • System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
    14·1 answer
  • Check My Work _____ are made in response to situations that have occurred frequently enough to enable managers to develop decisi
    15·1 answer
  • In scratch the location of a sprite is defined by what?
    10·1 answer
  • Which one of the following business names would be rated Incorrect for name accuracy? Answer McDonald's McDonald's H&amp;M McDon
    14·1 answer
  • The program is to be answered in Java Programming not C++ Please answer the following: Modify the BarChart program to accept the
    6·1 answer
  • Select the correct answer from each drop down menu
    8·2 answers
  • Essay about evolution of media shaped the values and norms of the society
    11·1 answer
  • An if statement must always begin with the word “if.” True False python
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!