1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masteriza [31]
4 years ago
14

Mindy wants to create a new subdirectory at ~/2019projects/projectx/projectplans to start storing the initial project plans for

projectx. However, this is the first project she has worked on in 2019 and the 2019projects directory does not exist yet. Which of the following commands will create the higher level directories if they do not already exist?
a. mkdir -r ~/2019projects/project/projectplans
b. mkdir -p ~/2019projects/project/projectplans
c. mkdir --all ~/2019projects/project/projectplans
d. mkdir -v ~/2019projects/project/projectplans
Computers and Technology
1 answer:
alexgriva [62]4 years ago
6 0

Answer:

b. mkdir -p ~/2019projects/project/projectplans

Explanation:

mkdir command in Linux environment is used to create a new directory. This command is used to create a folder to store the information in organized manners.

-p is used to create a parent folder in the directory. If we want to start a new project or want to store information about some new topic we will create a new folder for that purpose. So, -p is used to create a new folder in directory.

In above mentioned case, this is the first project that Mindy started in 2019, so she should create a parent directory of 2019 to save all projects details that she worked in 2019. So she should use -p with mkdir command to make 2019 as a parent folder.

You might be interested in
Readability is the level of vocabulary used on the page. True or false
konstantin123 [22]

Answer:

FALSE....john has no idea what hes talking about. i knew this was false yet i looked it up and got it wrong anyway because of john its freaking false

Explanation:

8 0
3 years ago
What is the school wifi password trying to do my class work in school on different devices.
lara31 [8.8K]
This cant be answered unless you name your school and someone goes to your school
4 0
3 years ago
You are auditing a client's network and have gained physical access to a workstation. To prevent any security software from dete
Llana [10]

Answer:

OphCrack LiveCD.

Explanation:

The user examines that server of a client, as well as requires complete control of such a system. To avoid recognizing its invasion by certain security programs, he wants to select a LiveCD which can break Operating System's credentials,  and he would have been using OphCrack LiveCD because it used to crack the credential of the Windows user.

So, the following are the reason by which the answer is correct according to the scenario.

3 0
3 years ago
A. True
Anuta_ua [19.1K]
100% TRUE AND VERY IMPORTANT
In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

From my experience, limit the number of those with full access (1-2 people, 3 at most).
Also, perform daily backups. If this data is critical, you can set timers for it to be backed up during intervals in the day.
Relationship databases or databases that can be shared should only be shared for viewing.
5 0
4 years ago
Do i have to buy affinity photo on windows and mac
nikdorinn [45]
no you don’t have to buy that
6 0
3 years ago
Other questions:
  • When entering a function or formula in a cell, which is the first character you must type?
    15·2 answers
  • The manufacturer doesn't need it the buyer doesn't want it the user doesn't know they're using it
    6·1 answer
  • The manager of a football stadium wants you to write a program that calculates the total ticket sales after each game. There are
    6·1 answer
  • Which is a disadvantage ofsimulation?
    5·1 answer
  • 1. Write a CFG to generate identifiers (IDs) in the Java Programming Language. An ID in Java is a string of characters consistin
    5·1 answer
  • (Java) Write a program that accepts a number of minutes and converts it both to hours and days. For example, 6000 minutes is 100
    10·1 answer
  • Need help coding this it uses input and I need to use the words good and morning
    10·1 answer
  • If the programmer translates the following pseudocode to an actual programming language, a syntax error is likely to occur. Can
    11·1 answer
  • Game Design!
    10·2 answers
  • I don't want my large video files using up all my hard drive space . can i archive my videos in on dvds or blu rays?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!