1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zimovet [89]
3 years ago
7

What command would you use to list the text files in your

Computers and Technology
1 answer:
frez [133]3 years ago
4 0
<span>After going to the CS lab someone helped me figure out the problem. I needed to be in a certain working directory at first, and I wasn't. After switching to that directory all I needed was the command:
       ../UnixCourse/fileAsst/*.txt
       and that took care of it for me. Thanks to everyone that helped and I hope this helps someone else.</span>
You might be interested in
What is the purpose of a search engine?
soldi70 [24.7K]
The purpose is to look for the topic that you need to ask a question and to find/get to a website you want to go to. hope this helped :)
4 0
4 years ago
Read 2 more answers
Adam is an Engineering student but has decided that he does not want to work in that field, but in the Manufacturing career clus
Flura [38]

He should try the <em>Manufacturing Production Process Development pathway </em>

8 0
3 years ago
Read 2 more answers
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Which situation best describes the prosumer effect?
elena-s [515]

C

Explanation:

https://www.sciencedirect.com/science/article/pii/S2405844019356750

8 0
4 years ago
6. assume there are three small caches, each consisting of four one-word blocks. one cache is fully associative, a second is two
sveticcg [70]

Answer:

Question: Assume there are three small caches, each consisting of four one word blocks. One cache is direct-mapped, a second is two-way set-associative, and the third is fully associative

Explanation:

Question: Assume there are three small caches, each consisting of four one word blocks. One cache is direct-mapped, a second is two-way set-associative, and the third is fully associative

6 0
2 years ago
Other questions:
  • Write a fragment of code that reads in integers from standard input, until end-of-file and sends their (floating point) average
    14·1 answer
  • A file with a .bat file extension is called a batch file. You can use a batch file to execute a group of commands, sometimes cal
    11·1 answer
  • Write the definition of a class WeatherForecast that provides the following behavior (methods): A method called set_skies that h
    13·1 answer
  • When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variab
    12·1 answer
  • Why must a mobile application be easily customized and personalized?
    14·2 answers
  • What does the revolver do?
    10·1 answer
  • Use MPLAB to write an asemply program to multipy two numbers (11111001) and (11111001). Then save the product in file reisters 0
    8·1 answer
  • Read the following statements and select the
    5·2 answers
  • _____ are labels for data, while _____ tie values together into one entity.
    15·1 answer
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!