1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mandarinka [93]
3 years ago
8

When you append a(n) ____ to a command, the command is run in a background process?

Computers and Technology
1 answer:
Leno4ka [110]3 years ago
4 0
The answer would be the & symbol.
You might be interested in
When did internet came to existence?
Luden [163]
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.

1981 access to the ARPANET was expanded.
7 0
3 years ago
Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
zavuch27 [327]

Answer:

This is not a good solution

Explanation:

Your web browser uses port 80 outgoing to make web requests, so if you’re blocking incoming port 80, all you’re blocking is users of the organization from connecting to the internet. You have indeed close a vulnerable port to access from hackers, but this also can reduce the productivity of the organization.

3 0
3 years ago
Nj hj hjkbh hj g7yubuyiycrtdryfrrcctcftt
Dafna1 [17]

Answer:

nice letters

Explanation:

6 0
3 years ago
Read 2 more answers
The function below takes a single string parameter: sentence. Complete the function to return everything but the middle 10 chara
dolphi86 [110]

Answer:

def get_middle_ten(sentence):

   ind = (len(sentence) - 12) // 2

   return sentence[ind:ind + 12]

# Testing the function here. ignore/remove the code below if not required

print(get_middle_twelve("abcdefghijkl"))

print(get_middle_twelve("abcdefghijklmnopqr"))

print(get_middle_twelve("abcdefghijklmnopqrst"))

7 0
3 years ago
_______ is a process that insures that operations meet data validity standards. For instance, information systems that process c
lutik1710 [3]

Answer:

The answer is consistency

Explanation:

Information systems deal with the retrieval, storage, manipulation and sharing of data for organisational needs. It is important that there are measures in place that corresponds to data validity standards. The process that ensures that operations meet these standards is known as consistency.

This is very necessary for information systems.

5 0
3 years ago
Other questions:
  • A pacing calendar is provided to students so they can:
    8·2 answers
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    6·2 answers
  • If you delete a file from removable media, it is stored in the recycle bin where you can recover it until you empty the recycle
    13·1 answer
  • What is the full path of the directory on this computer containing the SAM registry hive file
    15·1 answer
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • file Assume that a prototype of the part above was built from several cubes. The total volume of the part is 0.54675 in.3. What
    6·1 answer
  • What do you call the spreadsheet cell that is in effect and has a heavier black border around it?
    7·2 answers
  • What is one reason that writing effective messages is so important
    11·2 answers
  • Please describe the role of games in modern society!
    5·2 answers
  • What is game development​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!