1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
7

A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view

ed using the ls –l command. True or False? True False
Computers and Technology
1 answer:
jeka943 years ago
5 0

Answer:

False

Explanation:

A symbolic link contains a text string that is automatically interpreted and followed by the operating system as a path to another file or directory. This other file or directory is called the "target". The symbolic link is a second file that exists independently of its target. If a symbolic link is deleted, its target remains unaffected. If a symbolic link points to a target, and sometime later that target is moved, renamed or deleted, the symbolic link is not automatically updated or deleted, but continues to exist and still points to the old target, now a non-existing location or file. Symbolic links pointing to moved or non-existing targets are sometimes called broken, orphaned, dead, or dangling.

You might be interested in
How does a firewall provide network security
ehidna [41]
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
8 0
3 years ago
Develop a script to demonstrate an understanding of the overload (overwrite) methods of using Python operators. This lesson will
MrRa [10]

hsjshekejeoehejeoejebenwkwuwbnwlwjdvrbrnfnfjkddjddmdmdndnfndmdkdjdjdjdjjdjdjdjdkdkdkdkdfkkdjdjdjdyremssjyehsmmamaajbshsjsbdbsksidhdbdbddddddddododododkdkdkdjdjdhddhhdvxbxbbxbxbxjdiegebeodhe

8 0
3 years ago
An intruder can wreak havoc on a network by simply plugging in an infected USB flash drive.
Bas_tet [7]

Answer:

A. True

Explanation:

1. I took the test

2. Flash drive ports are connected to the rest of the computer, so putting in an infected flash drive into the port will cause the bug to spread throughout the whole device.

3 0
2 years ago
. When a system isdelivered over time, with each delivery (release) adding tothe
dexar [7]

Answer:

A. Incremental Development

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The answer to this question is Incremental Development, this is when the development of the system is implemented little by little as time goes on. On the other hand phase development is when a development cycle is rolled out in phases such as the brainstorming phase, Construction phase, marketing , and roll out phase. Since this development doesn't contribute to the system's functionality it is not the correct answer.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
solmaris [256]

Answer:

disable SSID broadcast and change the network name

Explanation:

Based on my experience with information technology and wireless networks my recommendation would be to disable SSID broadcast and change the network name. Disabling SSID will prevent the network name from appearing on devices that are searching for a network to connect to, and by changing the name it will also prevent anyone who knows the previous name from connecting unless they know the new name. Both of which will drastically increase security.

8 0
3 years ago
Other questions:
  • Which of the following describes the difference in light intensity between the brightest white and the darkest black that can be
    15·1 answer
  • In your opinion, is it more beneficial to have many folders or is it better to “nest” subfolders? Explain your response.
    10·2 answers
  • The computer component that makes sure that instructions are decoded and executed properly is the ___________.
    11·2 answers
  • You want to join your computer to a homegroup but you don't see any homegroups on your home network
    11·1 answer
  • Computer programming is an essential skill for anyone wishing to pursue a career in cybersecurity. What might be a good ""first
    13·1 answer
  • Concept about borderless classroom because of technology​
    9·1 answer
  • A desktop computer (named workstation22) can’t connect to the network. A network card was purchased without documentation or dri
    15·1 answer
  • A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not
    15·1 answer
  • In addition to reduced power consumption, what is an advantage of using hyperscale cloud computing data centers?
    8·1 answer
  • I need the full code for 6.1.3 code hs circles and squares please answer please help
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!