1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
4 years ago
14

Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for

projectx. However, this is the first project she has worked on in 2019 and the 2019projects directory does not exist yet. Which of the following commands will create the higher level directories if they do not already exist?
a. mkdir -r ~/2019projects/project/projectplans
b. mkdir -p ~/2019projects/project/projectplans
c. mkdir --all ~/2019projects/project/projectplans
d. mkdir -v ~/2019projects/project/projectplans
Computers and Technology
1 answer:
alexgriva [62]4 years ago
6 0

Answer:

b. mkdir -p ~/2019projects/project/projectplans

Explanation:

mkdir command in Linux environment is used to create a new directory. This command is used to create a folder to store the information in organized manners.

-p is used to create a parent folder in the directory. If we want to start a new project or want to store information about some new topic we will create a new folder for that purpose. So, -p is used to create a new folder in directory.

In above mentioned case, this is the first project that Mindy started in 2019, so she should create a parent directory of 2019 to save all projects details that she worked in 2019. So she should use -p with mkdir command to make 2019 as a parent folder.

You might be interested in
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
What does the Autosum feature on excel do?
BabaBlast [244]
The answer is 1. Pressing the Autosum button highlights the ten cells above it so that you can easily add things together. Hope this helps!
8 0
4 years ago
Which of the following statements is false?
GrogVix [38]

Answer:

bnnnnn A1

Explanation:

bnnnnnjm

8 0
3 years ago
Describe three different camera shots the director uses in Casablanca. What effect does each of these shots have on the plot, mo
Tcecarenko [31]
The movie Casablanca was considered as the standard for Classic Hollywood Movies. Below are the three different camera shots used by the Director in the movie:
1. The point of View Shot: also referred as POV shot. It is the camera shot where it shows what the character or the subject looking at in the film.
2.  Wide Shot: it also termed by others as the long shot or full shot. In the movie, it is the shot from a distance so the people or the characters will appear as indistinct shapes.
3. High angle Shot: In the film, it is the type of shot wherein the camera is placed above the subject with its lens pointing downward to make the subject small. Typically used in horror movies.
6 0
3 years ago
What type of hardware enables users to interact with a computer? Check all that apply. the CPU the hard disk drive the keyboard
valentina_108 [34]

Answer:

the keyboard

the monitor

the mouse

Explanation:

just took test

6 0
4 years ago
Read 2 more answers
Other questions:
  • How can social media be used in "child-driven" education? What benefits can students around the world gain from social media?
    12·1 answer
  • How to create a tender statement in database management?
    5·1 answer
  • You administer a Microsoft SQL Server database that supports a banking transaction management application. You need to retrieve
    5·1 answer
  • SOMEONE HELP PLEASE!!!!!
    6·1 answer
  • In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev
    7·1 answer
  • Please help it’s timed
    5·1 answer
  • Is it possible to construct a wait-free n-thread PeekableStack(2) object from an arbitrary number of atomic Stack objects and at
    11·1 answer
  • Cual de las siguientes es una desventaja del uso de las computadoras?
    5·1 answer
  • Why is a salt added to a password that is being stored in a database?
    5·1 answer
  • Which communication network pattern offers a fairly even flow of information, but two people interact with only one other?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!