1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
4 years ago
9

The true or false questions. 1.egrep can accept multiple filenames as input arguments.

Computers and Technology
1 answer:
BlackZzzverrR [31]4 years ago
5 0

Answer: True  

Explanation: yes, it is true that egrep can accept multiple filenames as input arguments for example egrep -r "text1/text2", so this will search in all the sub directories . E grep is also known as 'grep -E' which belongs to the group of grep function and we used egrep to separate multiple patterns for OR conditions. This is also very less time consuming if you are going to search multiple input arguments in multiple different logs at the same time.

You might be interested in
Which of the following tasks can you perform using a word processor?
frutty [35]

Answer:

check a document for spelling errors

Explanation:

With a word processor, you can easily edit and make changes to a document, move text around in a document, add images, change fonts, check for spelling errors

3 0
3 years ago
Fre.....ee p......oint....s pt 2
murzikaleks [220]

Answer:

Thanks for it

Explanation:

Brainlists please

3 0
3 years ago
Read 2 more answers
An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
Nataliya [291]

Answer:

D1= 60 HOSTS

network address - 200.120.80.64/26

subnet mask -255.255.255.192/26

D2 = 90 HOSTS

network address - 200.120.80.0/25

subnet mask -255.255.255.128/25

D3 = 90 HOSTS

network address - 200.120.80.128/25

subnet mask -255.255.255.128/25

5 0
4 years ago
Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) l
Pani-rosa [81]

Answer:

C. Mandatory access control

Explanation:

In the implementation of computer security, the mandatory access control (MAC) refers to the implementation of a security feature by operating systems. In this method, individual resource owners’ are unable to deny or grant permissions to a resources contained in a file. The criteria in a MAC when defined by the system administrator is implemented and enforced by the OS.

7 0
3 years ago
A computer is completely compromised when it wont turn on or operate. What is the best way to fix
miskamm [114]

There really is no getting it back, if it is from a virus, then you need to buy a new computer. If it is something internal, depending on what type of computer you have it might just be best to buy a new one. Hope this helps :-)

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an unintended consequence of pesticide use on crops?
    10·1 answer
  • Why are user application configuration files saved in the user’s home directory and not under /etc with all the other system-wid
    6·1 answer
  • What do “phone-copying” systems allow investigators to do?
    9·1 answer
  • Why is failure an important part of life and the engineering design process?
    13·2 answers
  • Plz I’ll mark Brainliest
    7·1 answer
  • How do i delete peoples comments
    14·2 answers
  • During the morning of a website launch for a new government sponsored healthcare portal, an unknown political rival, individual,
    15·1 answer
  • Can someone please help? i am trying to code my raspberry pi pico in python, and it says this is wrong. Can someone help tell me
    6·1 answer
  • Which is a correct explanation of first lines?
    9·1 answer
  • Which option is a real job title on the interactive media career pathway? A. Social networking specialist B. Information technol
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!