1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
3 years ago
8

As you are using some files on a workstation running Linux, you determine that a few of the files seem to be corrupted. What sho

uld you do?
a. Close all files and applications and run fsck.

b. Start DiskScan to check for file links.

c. Reformat your disk using the format command.

d. Use the Disk Check utility, which can be run at any time.
Computers and Technology
1 answer:
Verizon [17]3 years ago
7 0

Answer:

Option a Close all files and applications and run fsck.

Explanation:

In a Unix/Linux system, whenever there are some files seem to be corrupted, we can run command fsck to check for the consistency of the file system. The fsck give option to repair the damaged file systems or to review problems exists in the file system without fixing them. This command is similar to the ScanDisk feature that appears in the Windows Operating System.

You might be interested in
A biologic reaction is produced by 4 Gyt of a test radiation. It takes 16 Gyt of 250-kVp x-rays to produce the same biologic rea
Shalnov [3]

Answer:

4

Explanation:

Relative Biological Effectiveness (RBE) =

Standard Radiation dose / Test Radiation dose

for achieving the same biological effect.

The absorbed radiation dose is measured in units of Gyt(Gray in tissue).

In the given scenario, Standard radiation dose of 250 KVp X-rays = 16 Gyt

Corresponding Test Radiation dose = 4 Gyt

Therefore, Relative Biological Effectiveness = 16/4 = 4

7 0
4 years ago
Help me please! (*18* points!)
miss Akunina [59]

Answer:

Databars and Sparkliness are key types of conditional formatting in excel.

Explanation:

Databars show the relative magnitude of values in a dataset. Sparkliness are tiny charts that reside in a cell in excel. These charts are used to show the trend over the time or variation in the dataset.

3 0
3 years ago
What two devices in a computer should be considered "black boxes," and should never be opened due to risks involving charged cap
NNADVOKAT [17]

The two devices in a computer that should be considered "black boxes," and should never be opened due to risks involving charged capacitors are MONITOR and POWER SUPPLY.

Explanation:

  • Physical contact or close proximity to the open power supply caused a discharge from the capacitor that resulted in an electric shock. Capacitors can discharge current even when not energized because they hold a charge for some time after the power is turned off.
  • To do harm to your body, the voltage across the capacitor's terminals must be high enough to cause a harmful effect on you. There are no hard rules for at what voltage things become harmful, but a common 'rule of thumb' is that DC up to 48 Volt is considered low voltage. So a capacitor charged to a voltage below 48 V is fairly safe.
  • A charged capacitor can be very dangerous, so it's important that you avoid coming into contact with the terminals at all times.
3 0
3 years ago
What is the computer’s natural language?
kirill [66]

Answer:

binary computer natural language

4 0
3 years ago
An associate is seeking advice on which device to purchase for a friend who is a business owner. The friend needs the ability to
spayn [35]

The best recommendation in the mentioned scenario would be a smart watch.

Answer: Option A.

Explanation:

The best device for a business owner who needs an access to chat as well as to be in touch with the home office would be a smart watch. A smart watch is similar to a mobile device, which is worn on a wrist and which has a touchscreen display.

The benefits of smart watch are numerous. It makes us updated about everything without using our smartphone. The smart watch will help the business owner to engage with others and to handle his work at the same time.

5 0
4 years ago
Other questions:
  • a computer that no longer works after having minor repair work done to it may have been damaged by ______.
    6·1 answer
  • Which of the following can be sources of sediment? A. fragments of other rocks B. chemicals and minerals dissolved in water C. s
    11·1 answer
  • Suppose barriers to entry exist in the telecommunications industry. This best describes a _____ market.
    12·1 answer
  • . Identify an emerging crime issue in your community using data available from sources such as local newspapers, online police r
    6·1 answer
  • Select the correct answer.
    10·2 answers
  • A(n) ____ string contacts the data source and establishes a connection with the database using the Data Source Configuration Wiz
    5·1 answer
  • Often technical personnel who are not familiar with security techniques think that restricting access to ports on a router or fi
    5·1 answer
  • What are examples of templates the Input Mask Wizard offers? Check all that apply.
    12·2 answers
  • Select four tasks associated with operating system maintenance. Cleaning inside the computer Defragmenting the hard drive Deleti
    11·1 answer
  • What kind of skill is persuasion?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!