1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
3 years ago
12

cd to the directory called final that is located within my home directory. While viewing the file called mypasswd you notice tha

t all of the references to the user's shells, the C shell, were entered in upper-case letters. That is not correct. Create a sed command string that will convert ONLY the references to the user's shell CSH to csh within the file called mypasswd and save the output to a new file called newpasswd in your home directory. Be Careful. There are other refernces to CSH in the file. Which comand string will do this

Computers and Technology
1 answer:
Crank3 years ago
7 0

Answer:

sed 's/CSH$/csh/g' mypasswd > ~/newpasswd

Explanation:

The SED is a stream editor, where s’ which substitutes the “csh” instead of word “CSH” in the file called mypasswd and save the output to the newpasswd. In the screenshot at the attached file shows the data of mypasswd and newpasswd files.

You might be interested in
Your program has a two-dimensional array, scores. You are implementing your array with lists. Each member in the array is a pair
Viefleur [7K]

Answer:

scores.append(6,2)

Explanation:

This is a complicated question because in theory, scores.insert can also add values, but I am sure that the only line of code that would work is scores.append(6,2)

7 0
3 years ago
Which of these statements most accurately describes cookies?
horsena [70]
A cookie(s), on a website, is a small text file that is placed on a computer by a website. Most websites online use cookies to track data. A person can turn off their cookie tracking by going into the settings and turning it off. You can directly choose to not have cookies placed on your computer or phone. However, some website does require the cookies to be enabled before you can visit the website. The correct answer will be C. 
5 0
3 years ago
These factors influence the design of a network.
REY [17]
Availability ,devices and applications, performance, security, scalability.
8 0
3 years ago
Read 2 more answers
Which program, available on all operating systems, provides all types of information from a dns server and allows you to query a
JulsSmile [24]

The program Nslookup, is available on all operating systems and provides all types of information from a DNS server and allows you to query all types of information from a DNS server and change how your system uses DNS.

The network administration command-line tool nslookup can be used to verify that your DNS servers can resolve external domain names.

6 0
3 years ago
Which statement is true about the filtering technique? A. You cannot apply multiple filters. B. You cannot remove a filter once
Naily [24]

Answer:

<u>C. You cannot unhide rows by removing filters</u> is the correct statement about filtering technique.

Explanation:

We can apply multiple filters for rows or columns. If we would like to view the data satisfying multiple filters, this option can be used.

Once a filter is applied, it can be removed or added again. The hidden rows or columns will be visible once all the filters are removed. By building a selection list of all the rows that should not be visible, we can hide the rows by removing filters.  

Filters can be applied to any row or column.

5 0
3 years ago
Other questions:
  • The /tmp directory is a temporary directory and will not exist on a system at all times. True or False?
    15·1 answer
  • How can rows be added to a table? Check all that apply
    13·2 answers
  • Create a loop that will output all the multiples of 5 that are greater than zero and less than 60 (do not include 60). 5, 10, 15
    10·1 answer
  • Which of the following describes the term "false information?"
    5·1 answer
  • Description:
    7·1 answer
  • Functions of barriers include (mark all that apply): A. Define boundaries B. Design layout C. Deny access D. Delay access
    10·1 answer
  • What is the advantages and disadvantages of hardware devices and software devices ?
    9·1 answer
  • Let G = (V, E) be an undirected graph. Design algorithms for the following (in each
    6·1 answer
  • Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input
    5·1 answer
  • Self-driving cars are a result of developments in which field of computer<br> science?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!