1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
den301095 [7]
3 years ago
11

The directory "a" contains its subdirectory "b" and there is no other entry in the directory "a". You want to display "the conte

nts of directory a are: b". The contents are to be displayed using "ls" command. Which command helps you accomplish that?
Computers and Technology
1 answer:
Svet_ta [14]3 years ago
6 0

The answer assumes that the question is about which command help accomplish display directory contents in Unix-like operating systems.

Answer:

The command is <em>ls</em>.

Explanation:

The command <em>ls</em> (short for <em>list</em>) displays a variety of important information in different ways regarding any directory contents. Because of this, it is probably one of the most used commands in Unix-like operating systems.

Any directory can contain directories and files of different sizes, recently created/modified, attributes like permissions for being accessed, and, with this command, we can see all this information by size, chronologically, by owner, and/or by many more ways.  

In the question, we can accomplish to list that the directory "a" contains its sub-directory "b" and no other entry using the next line of code:

Command-line 1: \\ ls\; a (<em>the command "says": display content of a</em>)

Result: b

The result is only the directory <em>b </em>because there is no other entry in it.

To display more information regarding <em>b</em>, we can use the many options available for the command <em>ls</em>, like <em>-a</em> (all entries), <em>-d</em> (only directories), <em>-l</em> (long listing format), and so on, e.g. ls -a  A (display all entries in directory A, included hidden files).

You might be interested in
Which is needed for the specific task of inserting a chart into a report?
Arturiano [62]

To add charts in Access to reports, click the “Create” tab in the Ribbon. Then click the “Report Design” button in the “Reports” button group. Unlike other report controls, the chart control uses its own data source to show its data. Therefore, you can insert it into a blank, unassociated report, if desired

6 0
2 years ago
Help Menu is available at which button in the keyboard?
kvasek [131]
Answer: It should be F1.
6 0
3 years ago
PLEASE HELP ASAP!!!!111 Read "Teenagers are rewriting the rules of the news" (find it somewhere and answer questions below)
Ilya [14]

Answer:

Sorry, we picked up your question late. There are a lot of questions, and every now and then some misses out. And I am sure you will understand. However, the cool thing is your answers are correct. I read the complete article on young adults or teenagers and found the same. And I am sure you will agree with the facts, and use its best meaning in your own life. I am, however, listing below all the answers for your complete satisfaction. And I congratulate you, you are up with the correct list of answers.

The answer to the First question is:

B. the description of how influencers follow young social media users"

Second question answer is

C. Andrew Yang

And the third question answer is:

C. Teens and young adults consume and spread news information through social media.

And I am sure you must have liked this article. Article reading is a good habit. You should always start a day by reading one article online or in newspaper.

Explanation:

Please check the answer section.+

4 0
3 years ago
The use of computer in a modern world is as a result of complexity. true or false
Schach [20]
This is false. The use of computer is a result of technology progress.
6 0
3 years ago
An attacker compromises a Linux host, installing a web shell as a backdoor. If the attacker gained access to the host through a
OverLord2011 [107]

Reverse shell is known to be the type of attack that is said to have occurred in the above case.

<h3>What is reverse shell?</h3>

A reverse shell is said to be “connect-back shell,” and it is one that often takes advantage of the computer weakness of the target to start a shell session and it often access the victim's system.

Hence, Reverse shell is known to be the type of attack that is said to have occurred in the above case.

See options below

A.) Man-in-the-Browser (MitB)

B.) Reverse shell

C.) Rootkit

D.) Session hijacking

Learn more about Reverse shell from

brainly.com/question/16607263

#SPJ1

5 0
1 year ago
Other questions:
  • Which layout manager constructor call would be best-suited to create a telephone handset GUI which has three rows of three keys
    12·1 answer
  • What is the term used for describing the judgement or common sense part of problem solving​
    11·1 answer
  • Which answer choice correctly distinguishes among the three pieces of data?
    13·1 answer
  • When computer networks are connected to each other, the system is called a(n) ____.
    13·1 answer
  • The computer output for integer programs in the textbook does not include reduced costs, dual values, or sensitivity ranges beca
    14·1 answer
  • 9. h=
    6·1 answer
  • A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
    14·1 answer
  • Which types of charts are examples found in Excel? Check all that apply.
    15·1 answer
  • Five year ago, Amit was three times as old as Arman. Ten years later Amit would be twice as old as Arman. How old is Arman now? 
    9·2 answers
  • Tiền tệ ra đời là kết quả
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!