1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
3 years ago
10

You recently upgraded your computer and added an extra 512 MB of RAM. Consequently, you want to increase your swap space by addi

ng a new swap area. The second hard disk has an unused partition (/dev/sdb2) that you want to format for the swap area. In this lab, your task is to: Create a swap partition on /dev/sdb2. Activate the swap partition.
Computers and Technology
1 answer:
STatiana [176]3 years ago
8 0

Answer:

Following are the answers of the question.

  • mkswap /dev/sdb2
  • swapon /dev/sdb2

Explanation:

Firstly we have to generate the swap partition on the following directory then we have the following command for the swap partition that is :

mkswap /dev/sdb2

Then, we have to activate the following swap partition after generating the swap partition by using the following commands that is :

swapon /dev/sdb2

So, the following commands is correct for creating or activating the swap partition according to the following scenario.

You might be interested in
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
Fill in the table below of the Interactive Word Wall. You are provided with the
kakasveta [241]

Answer:

that is so long i just want points

Explanation:

7 0
2 years ago
Assume you have written a method with the header num yourMethod(string name, num code). The method's type is ____ .
elena-s [515]

A method is written with the header 'num' yourMethod(string name, num code). The method's type is <u>'num'.</u>

In the context of programming. a header refers to supplemental data placed at the beginning of a block of data being transmitted or stored. In the context of the Java method, the header is where you tell the Java program what value type if any, the method will return (a string value, an int value, a double value,  etc). As well as the return type, you require a name for your method, which is also placed in the header. You can pass values over to your methods in between a pair of round brackets.

You can learn more about method in Java at

brainly.com/question/28489761

#SPJ4

8 0
1 year ago
Write a script that will read the file, (strip the carriage returns), create a dictionary of names and favorite radishes and cre
amm1812

Answer:

python code below:

names={}#first dictionary for names and favorite

favor={}#radish type and how many are favorite

f=open("raddish.txt")#opening file

for i in f:#for each line

j=i.strip().split("-")#splitting base on -

names[j[0].strip()]=j[1].strip()#getting first dictionary

if j[1].lower().strip() in favor:#counting the favorite elements

favor[j[1].lower().strip()]+=1

else:

favor[j[1].lower().strip()]=1

print ("First Dictionary",names)#printing the names

print("second dictionary:",favor)#printing the favorite numbers

f.close()#closing file

Explanation:

The program was implemented using python programming language.

Its operation is to read the file, (strip the carriage returns), create a dictionary of names and favorite radishes and create a dictionary of each radish type and the number of people who chose that as their favorite.

It returns as output the names of people entered for the Radishes.

See attachment for screenshot.

8 0
3 years ago
What is the name for the base-2 system used by computers to represent
NemiM [27]

Answer:

B. Binary Code

Explanation:

Binary code is the base-2 system used by computers to represent data. Binary code consists of 0's and 1's which can be used to represent states such as on or off; go or no-go and more.

7 0
2 years ago
Other questions:
  • Why do computers need to periodically check the dns for websites you have already visited? enter your answer here?
    15·1 answer
  • 1. Mobile devices have a _________ viewport that displays a web page content that fits within a mobile screen.
    11·1 answer
  • What does OLE stand for? Object
    8·2 answers
  • Reading for subject content follows the same steps as reading for entertainment. True or false.
    10·2 answers
  • Encryption Using Rotate Operations Write a procedure that performs simple encryption by rotating each plaintext byte a varying n
    10·1 answer
  • 4-One possible performance multiplication enhancement is to do a shift and add instead of an actual multiplication. Since 9 * 6,
    12·1 answer
  • Which type of virus includes protective code that prevents outside examination of critical elements?
    14·1 answer
  • Describe two different examples of potential conflicts, and explain why these conflicts can have a negative impact on
    14·1 answer
  • 45 points!
    10·2 answers
  • A message is sent to all hosts on a remote network. Which type of message is it?.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!