1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fiesta28 [93]
3 years ago
11

What linux command displays the ip address and subnet mask?

Computers and Technology
1 answer:
Nookie1986 [14]3 years ago
3 0
Type "ifconfig" at the terminal prompt, then press the "Enter" key. The IP address is labeled as "inet addr." The subnet is labeled as "Mask."

step 2

Type "netstat -r" at the command prompt, then press the "Enter" key to view the gateway address.

You might be interested in
Assume that a kernel is launched with 1000 thread blocks each of which has 512 threads. If a variable is declared as a shared me
Alex

Answer:

The answer to this question is the option "B".  

Explanation:

In this question, the answer is option B which is 1,000 because the kernel is a central part of an operating system. kernel manages the computer and the hardware operations. most especially memory and CPU time. It also sheared a memory variable is allocated to thread blocks. That's why the answer to this question is 1,000.

7 0
3 years ago
Modify the list according to the following: append the smallest value at the end of the list when all numbers in the list are ne
ddd [48]

Answer:

The solution code is written in Python 3:

  1. def modifyList(listNumber):
  2.    posCount = 0
  3.    negCount = 0
  4.    for x in listNumber:
  5.        if x > 0:
  6.            posCount += 1
  7.        else:
  8.            negCount += 1
  9.    
  10.    if(posCount == len(listNumber)):
  11.        listNumber.append(max(listNumber))
  12.    
  13.    if(negCount == len(listNumber)):
  14.        listNumber.append(min(listNumber))
  15.    
  16.    print(listNumber)
  17. modifyList([-1,-99,-81])
  18. modifyList([1,99,8])
  19. modifyList([-1,99,-81])

Explanation:

The key step to solve this problem is to define two variables, posCount and negCount, to track the number of positive value and negative value from the input list (Line 2 - 3).

To track the posCount and negCount, we can traverse through the for-loop and create if else statement to check if the current number x is bigger than 0 then increment posCount by 1 otherwise increment negCount (Line 5- 9).

If all number in the list are positive, the posCount should be equal to the length of the input list and the same rule is applied to negCount. If one of them happens, the listNumber will append either the maximum number (Line 11 -12) or append the minimum number (Line 14-15).

If both posCount and negCount are not equal to the list length, the block of code Line 11 -15 will be skipped.

At last we can print the listNumber (Line 17).

If we test our function using the three sets of input list, we shall get the following results:

[-1, -99, -81, -99]

[1, 99, 8, 99]

[-1, 99, -81]

3 0
3 years ago
Which term describes a secure, individual, private cloud-computing model hosted within a public cloud?
grin007 [14]

The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

<h3>What is this cloud about?</h3>

A hybrid cloud is known to be a system or a model which is said to be a form of a private cloud that is linked with public cloud infrastructure, and it is one that tends to give room for an organization to act workloads in two environments.

Note that In this model, the public cloud is known to be one that is seen and it is one that becomes an extension of the private cloud to make a single, uniform cloud.

Hence, The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

Learn more about hybrid cloud from

brainly.com/question/27838623

#SPJ1

7 0
2 years ago
HELP!!!
jeyben [28]

Answer:

A. a tool tip

Explanation:

6 0
3 years ago
Read 2 more answers
Access fundamentally refers to the ability of a subject and a(n) ___________ to interact.
mars1129 [50]

Answer:

The correct word for the blank space is: object.

Explanation:

Access Control System (<em>ACS</em>) is a computer structure that allows or restricts users to access to features and information of a server. ACS is used to protect confidential data and to make sure the servers are going to be used by authorized users which diminish malfunctions. One of the basic principles of ACS is letting subjects and objects to interact properly.

5 0
4 years ago
Other questions:
  • The arrow next to All Programs indicates _____. that this item cannot be selected that this was the most recently used item the
    7·2 answers
  • Which of the following refers to a feature of wikis that allows the restoring of earlier work in the event of a posting error, i
    9·1 answer
  • You've been asked to find the largest number in a range of numbers. Which of the following could you use to find the largest num
    8·1 answer
  • Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and cond
    9·1 answer
  • A group of computers that are interconnected in order to share information or documents is called a _____.
    7·1 answer
  • Which page format would you likely use for a photograph of a standing tree? AND why would you use that format?
    11·1 answer
  • This is a program that calculates information about orders of shirts and pants. All orders have a quantity and a color. Write a
    7·1 answer
  • Which componet is the smallest unit in a spreadsheet
    15·1 answer
  • Recommend how could you integrate positive aspects of digital literacy into your own
    13·1 answer
  • How can I use HTML to express a personal value
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!