1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
14

​what two commands below can be used to locate files on a filesystem?

Computers and Technology
1 answer:
Ad libitum [116K]3 years ago
8 0

Two command that are used in Linux operating system to locate files on a filesystem are locate and find.

# find / -name data.txt

The find command has a number of options. This makes the find command very configurable

# locate data.txt

The locate command uses a previously built database.


You might be interested in
Four possible skills a person could have
cluponka [151]

Answer:

Active listening skills.

Genuine interest in others.

Flexibility.

Good judgment.

Explanation:

4 0
3 years ago
You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.
kherson [118]

Answer:

in

Explanation:

Not an explanation, but here's an example:

if "mouth" in "mouthwatering":

   print("It is.")

else:

   pass

Another example:

if "water" in "mouthwatering":

   print("Yes.")

else:

   pass

6 0
3 years ago
Rebecca has finished with the research and outline portion of her slide presentation now the next logical step is to begin worki
e-lub [12.9K]

Answer:

The answer is creating and layout and template style

Explanation:

APEX VERIFIED just did it

4 0
3 years ago
Read 2 more answers
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be
coldgirl [10]

Answer:

The answer is "timing".

Explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.  
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
6 0
3 years ago
Which were important characteristics of Sparta's government? Select the two correct answers. A. Oligarchs were able to hold a lo
Cerrena [4.2K]

Answer:

Sparta's government was a combination of a monarchy, a democracy, and an oligarchy. and oligarchs were able to hold a lot of power in government.

Explanation:

Spartans government loved to have power more than anyone in their century.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Why is it unlikely that you will find the ip address 192.168.250.10 on the internet?
    15·1 answer
  • The first time you start Outlook on a home computer, the ____ feature guides you to provide information that Outlook needs to se
    11·1 answer
  • The global network that links millions of computers is the
    9·2 answers
  • Your friend Suzy calls to ask for help with her computer. She says when she first turns on the computer, she doesn’t hear a spin
    10·1 answer
  • Which of the following is not a shared characteristic of new media.
    8·1 answer
  • Effective presentations vary the color scheme on each slide.<br><br> True<br> False
    5·2 answers
  • The primary benefit of a VPN that uses _________ is that an intercepted packet reveals nothing about the true destination system
    6·1 answer
  • Reversing the elements of an array involves swapping the corresponding elements of the array: the first with the last, the secon
    6·1 answer
  • If you wanted a computer to store a variable with the content of “110 Maple Street,” which data type would be most appropriate?
    15·2 answers
  • Designing advanced power systems for naval vessels is an example of nuclear engineering.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!