1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotegsom [21]
3 years ago
5

What is the command to create a compressed archive(archive1.tar.gz) of files test1 test2and test3.

Computers and Technology
1 answer:
yulyashka [42]3 years ago
7 0

Answer:

The command to create a compressed archive (archive1.tar.gz) is

tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3

Explanation:

The explanation for the above command is

The general command to create a compressed archive is

tar -czvf name-of-archive.tar.gz /path/to/directory-or-files

Here, the terms are as follows:

-c : Creates an archive

-z : Compress the archive with gzip.

-v : This is known as verbose. This is an optional command and it displays the progress on terminal command. Without this the progress is not displayed on terminal command.

-f : Allows to specify the file name of the archive.

Here, if we want to archive multiple files, we provide the command the names of multiple files or directories of the files also can be used.

So, the command tar\,\,-czvf\,\,archive1.tar.gz\,\,test1\,\,test2\,\,test3

creates a compressed archive  - archive1.tar.gz of files test1, test2 and test3.

 

You might be interested in
When the tv was created (year)
nikitadnepr [17]

Answer:

1927

Explanation:

6 0
3 years ago
Read 2 more answers
A _____ describes two or more computers connected to each other.
WARRIOR [948]

Answer:

Computer network.

Since it is 2 or more computers connected together.

5 0
3 years ago
Read 2 more answers
Pamela is asked to use a data visualization tool and show the relative frequency of the 50​ most-used terms in survey responses.
bezimeni [28]

Answer:

a. tag clouds

Explanation:

Tag clouds or word cloud is a form of data visualization that shows the most occurring word or words in an edited text input.

Clustering is a technique in data analytics that categorizes data based on data types, separating them into clusters.

List  is a data types in data analysis programming languages

8 0
3 years ago
Which component of a database management system (DBMS) is used to design elements of an application using a database, such as da
In-s [12.5K]

Answer: Application Generation

Explanation:

Application generation is the subsystem of database management system(DBMS) that helps in generation of range of transaction in-depth applications .

  • These application primarily focus on performing thorough steps got execution of transactions.
  • It is mostly commonly used by IT(Information technology) professionals programming languages, programming interfaces, data entry screen.

6 0
3 years ago
Tina wants to make a quiz using a presentation for her students. The presentation will have a question with multiple answers om
evablogger [386]

Answer: Question is not clear ,But an example python code is below..

Using only Beginner Level IF-ELIF,ELSE,NESTED IF statements :)

Explanation:

print("Welcome To Quizzy Quizes")

print("Q 1. Do elephants bath everyday?")

x=str(input("Enter Yes/No :"))

if x == 'yes':

   print("correct answer!!")

else :

   print("Wrong ,try again")

   

a= str(input("Do you want to Continue Playing?"))

if a == 'yes':

   print("Loading...")

else:

   exit()

   

print("Q.2 have you ever had been too serious that u had street Fight with someone?")

y = str(input("enter yes/no:-"))

if y == 'yes':

   print("WHY SO SERIOUS? HEHE")

else :

   print("Why so Poor,Have some fight !")

print("Q.2  Hero or villain for a day? ")

z  = str(input("enter Answer:"))

if z == "hero":

   print("Which SuperHero ?")

   b = str(input("Enter Answer:"))

   print("Great Selection, Now Save the World")

if z == "villain":

   print("Which Villain?")

   c = str(input("Enter Villain name:"))

   print("great selection , Now get ready to destroy the world")

   

7 0
3 years ago
Other questions:
  • Bit stream methods commonly use algorithm functions like the exclusive or operation (__________.
    11·1 answer
  • Write a Temperature class that will hold a temperature in Fahrenheit, and will provide methods to get and display the temperatur
    5·1 answer
  • Which of the following operating systems is able to join a domain a) Microsoft office pro b) Microsoft surface R.T. c) google an
    9·2 answers
  • Select the correct answer.
    6·2 answers
  • The rock cycle _____.
    14·1 answer
  • How did New York Governor Hugh Carey handle Sostre’s situation?
    9·2 answers
  • Write an assembly code to implement the y=(x1+x2)*(x3+x4) expression on 2-address machine, and then display the value of y on th
    7·1 answer
  • How do big organizations take back their data to be reviewed after a disaster?
    6·1 answer
  • An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RR
    5·1 answer
  • How serious are the risks to your computer security?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!