1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viktelen [127]
3 years ago
7

A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view

ed using the ls –l command. True or False? True False
Computers and Technology
1 answer:
jeka943 years ago
5 0

Answer:

False

Explanation:

A symbolic link contains a text string that is automatically interpreted and followed by the operating system as a path to another file or directory. This other file or directory is called the "target". The symbolic link is a second file that exists independently of its target. If a symbolic link is deleted, its target remains unaffected. If a symbolic link points to a target, and sometime later that target is moved, renamed or deleted, the symbolic link is not automatically updated or deleted, but continues to exist and still points to the old target, now a non-existing location or file. Symbolic links pointing to moved or non-existing targets are sometimes called broken, orphaned, dead, or dangling.

You might be interested in
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
What is the output of the code below assuming that global variable x has value 2 and global y has value 3? def f1(): return "ab"
Lostsunrise [7]

Answer:

ababababab

Explanation:

The code above is written in python and python uses indentation .So let me rephrase the code accordingly and explain what the code really do.

Note x and y is a global variable which can be used by any of the function declared.  According to the question x and y are 2 and 3 respectively

The first block of code describes a function f1 without any argument but the code should return the string "ab"

def f1():

      return "ab"

The second block of code defines a function f2 and returns the value of f1 multiply by x. This means you are multiplying the string "ab" by 2 which will be equals to abab

def f2():

           return f1() * x

The third block of code declared a function f3 and returns the sum of  f2 and product of f1 and y. using PEMDAS principle the multiplication aspect will be solved first so, ab × 3 = ababab, then we add it to f2  . ababab + abab = ababababab.

def f3():

        return f2() + f1() * y

Finally, we print the function f3 value to get ababababab

print(f3())

If you run the code on your IDE like below you will get  ababababab

x = 2

y = 3

def f1():

      return "ab"  

def f2():

      return f1() * x  

def f3():  

      return f2() + f1() * y  

print(f3())

     

7 0
3 years ago
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Marysya12 [62]

Answer:

Good choice, as its one of the most secure wireless communications encryption methods, even though WPA2 would be the best

Explanation:

8 0
4 years ago
At what x position are the ellipses drawn??? thanks ♡​
Anna71 [15]

Answer:

55

Explanation:

The xPos variable is set to 55 and they have set the variable in the code for the ellipses in the x position

Hope this helps

7 0
3 years ago
List the actual network numbers for each of these subnets. (If the list is longer than 16, simply list the first 3 and final 3 "
Andre45 [30]
69 is the answer because I know or it could be 430
3 0
3 years ago
Other questions:
  • What is a Network-layer routing technology that enables a group of workstations to share a single registered address?
    5·1 answer
  • _______ are created under ________, similar to how you create individual files within a broader file folder
    9·2 answers
  • An example of live footage is when?
    10·2 answers
  • Which tab is used to edit objects on the slide master and layouts
    10·1 answer
  • What is a mortgage?
    8·2 answers
  • I'm using assembly language. This is my assignment. I kinda confused about how to write code for this assignment. Can anyone exp
    11·1 answer
  • Choose two technologies that you think would help the company meet its goals. Then fill in the chart below to compare the techno
    11·2 answers
  • ¿Que similitudes y que diferencias tenían el estado y la iglesia en el proceso de colonizacion de america?​
    6·1 answer
  • (1101101)2 − (1001)2
    15·1 answer
  • 10. Site-to-Site VPN architecture is also known as
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!