1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
13

If you were doing a regular expression inside a Linux command line, which special character on the keyboard would give you two p

ossible matches using the example below: car ____ truck
Computers and Technology
1 answer:
Murrr4er [49]3 years ago
6 0

Answer: car | truck

Explanation: The pipe (|) symbol used can be used in regular expression to simply imply OR. This means when used in between expression, can be used to search for all matches of the strings in which it stands in between. In the scenario above, If the pipe symbol is located in between the two strings, such as [ cars | trucks], the expression returns possible occurrence of the strings cars and trucks. It may also be used to locate and return the occurrences of more than 2 strings, such as; string1 | string2 | string3

You might be interested in
The random module is a group of functions that are used to deal with random numbers.
maksim [4K]
True because it is the
5 0
3 years ago
Read 2 more answers
Session Hijacking refers to the exploitation of a valid computer session where an attacker takes over a session between two comp
noname [10]

Answer:Weak session ID generation algorithm

Explanation: Session hijacking is the hacking by disguising as the authenticated user and illegally exploit the particular computer session. IP packets are invoked by the disguised attacker into the active session between the legal computer user. It is also called session key.

It gives the hacker to use the data and services of the computer in an unauthorized manner. It arises due to the session of communication are not secure and strong,key used for session is weak etc.

5 0
3 years ago
What were black codes?
Lyrx [107]
<span>The Union victory in the Civil War may have given some 4 million slaves their freedom, but African Americans faced a new onslaught of obstacles and injustices during the Reconstruction era (1865-1877). By late 1865, when the 13th Amendment officially outlawed the institution of slavery, the question of freed blacks’ status in the postwar South was still very much unresolved. Under the lenient Reconstruction policies of President Andrew Johnson, white southerners reestablished civil authority in the former Confederate states in 1865 and 1866. They enacted a series of restrictive laws known as “black codes,” which were designed to restrict freed blacks’ activity and ensure their availability as a labor force now that slavery had been abolished. For instance, many states required blacks to sign yearly labor contracts; if they refused, they risked being arrested as vagrants and fined or forced into unpaid labor. Northern outrage over the black codes helped undermine support for Johnson’s policies, and by late 1866 control over Reconstruction had shifted to the more radical wing of the Republican Party in Congress.</span>
8 0
3 years ago
Read 2 more answers
Susan is a network administrator and is setting up her company's network. In the process to determine an open port on a firewall
Dovator [93]

Answer:

poop head is big butt

Explanation:

soorru

4 0
2 years ago
In excel, combining two or more selected cells into one cell is called ____ cells
n200080 [17]
The answer that would best complete the given statement above would be the word "MERGING". So here is the complete statement. <span>In excel, combining two or more selected cells into one cell is called MERGING cells. Hope this answers your question. Have a great day!</span>
4 0
3 years ago
Other questions:
  • Suppose that cells B1 through B100 of an Excel spreadsheet contain the quantity of units ordered on each of 100 different days.
    13·1 answer
  • Identify a major drawback of browsing web pages on mobile devices.
    15·1 answer
  • Explain why using infrared telescopes would not be useful for stargazing in the city?
    14·1 answer
  • For each of these statements find a domain for which the statement is true and a domain for which the statement is false. a) Eve
    13·1 answer
  • List the gcc command-line options for each of the following: Generate a .o file rather than an executable. Generate a .s (assemb
    6·1 answer
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • What is an example of a device that commonly use Linux today
    7·2 answers
  • Which statement best describes what happens when a computer starts?
    9·1 answer
  • allows users to enter text and control the computer with their voice.allows users to enter text and control the computer with th
    14·1 answer
  • // This pseudocode is intended to describe
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!