1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
11

The directory "a" contains its subdirectory "b" and there is no other entry in the directory "a". You want to display "the conte

nts of directory a are: b". The contents are to be displayed using "ls" command. Which command helps you accomplish that?
Computers and Technology
1 answer:
Svet_ta [14]3 years ago
6 0

The answer assumes that the question is about which command help accomplish display directory contents in Unix-like operating systems.

Answer:

The command is <em>ls</em>.

Explanation:

The command <em>ls</em> (short for <em>list</em>) displays a variety of important information in different ways regarding any directory contents. Because of this, it is probably one of the most used commands in Unix-like operating systems.

Any directory can contain directories and files of different sizes, recently created/modified, attributes like permissions for being accessed, and, with this command, we can see all this information by size, chronologically, by owner, and/or by many more ways.  

In the question, we can accomplish to list that the directory "a" contains its sub-directory "b" and no other entry using the next line of code:

Command-line 1: \\ ls\; a (<em>the command "says": display content of a</em>)

Result: b

The result is only the directory <em>b </em>because there is no other entry in it.

To display more information regarding <em>b</em>, we can use the many options available for the command <em>ls</em>, like <em>-a</em> (all entries), <em>-d</em> (only directories), <em>-l</em> (long listing format), and so on, e.g. ls -a  A (display all entries in directory A, included hidden files).

You might be interested in
You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
mario62 [17]

Answer:

C

Explanation:

It is best to Implement a UTM appliance.

A Unified Threat Management (UTM) system is a type of network hardware appliance, virtual appliance or cloud service that protects businesses from security threats in a simplified way by combining and integrating multiple security services and features.

DescriptionUnified threat management is an approach to information security where a single hardware or software installation provides multiple security functions. This contrasts with the traditional method of having point solutions for each security function.

Cheers

8 0
3 years ago
Smallest kind of computer
jeka57 [31]
I don’t know if i’m right but like Michigan Micro Mote ?
3 0
2 years ago
Read 2 more answers
Mobile devices need to work within limited screen space .
zloy xaker [14]
True. Mobile devices need to work within limited screen space. Mobile devices are designed to be portable and designed to be carried around without hassle. Mobile devices are used for personal activities such as talking privately, chatting and many more that is why it is designed to be small.
3 0
3 years ago
What statement would you use to assign the value 32 to the variable cheeses?
bezimeni [28]

Answer:

Statement to assign 32 to variable cheeses.

cheeses=32;

Explanation:

To assign any value to a variable in any programming language, we use "="operator.First declare a variable "cheeses"of type "int" in this case.Then assign 32 to variable "cheeses" with the help of "=" operator.After assigning 32 , variable will store 32 in it.

Implementation in c++.

#include <bits/stdc++.h>

using namespace std;

int main()

{

int cheeses;

cheeses=32;

return 0;

}

6 0
3 years ago
Area on a computer screen where<br> you perform work
raketka [301]

Answer:

Screen or monitor, it may be also the central processing unit (CPU) where you manage your computers actions

brainliest please ;)

3 0
3 years ago
Other questions:
  • Ted is a fashion designer. Where is he most likely to work
    9·1 answer
  • How to make a sad face on keyboard using alt?
    5·2 answers
  • Write a Scheme function called "sum" which takes an input function func and a nonnegative number n and outputs the value
    10·1 answer
  • Most presentations use text: A. To maximize area and style. B. At a minimum. C. To draw attention to content. D. Without restrai
    9·2 answers
  • If you want to open the Navigation pane to do a Find, what should you first click on the Home tab? Paragraph, Editing, Styles, o
    15·1 answer
  • What are the two ways that assets are
    5·1 answer
  • Hard light is usually not good for filming. True False
    11·2 answers
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • It is possible to make the document larger for viewing small text.<br><br> True<br> False
    15·2 answers
  • I need a explanation for this 02 question for a test I will have .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!