1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vodka [1.7K]
3 years ago
7

In a folder hierarchy, the top level is referred to as which of the following?

Computers and Technology
1 answer:
Vesnalui [34]3 years ago
4 0

Answer:

B. root

Explanation:

Every user in Linux is assigned a folder from which they can store their files. The interpreter allows you to abbreviate your route with the “~” symbol. The ls command without any additional data shows the files in the current directory, but if after the name of the command a path is written, it shows the files in that path. Therefore, the ls ~ command shows the files in the user's folder.

In addition to the folders and files created by the user or programs, every Linux folder has two subfolders defined by default:

“..”: It is the top level folder in the file hierarchy that contains it. This subfolder is also present in the root of the filesystem (the folder with absolute path “/”), but points to itself.

“.”: It is the folder itself that appears as if it were also a subfolder. It can be considered as a "self-reference" or pointer to itself.

These folders are normal folders in the system for all purposes; that is, they can be used on routes. For example, the path /dirA/dirB/dirC/../fichero2.txt refers to the file that is stored in the dirB folder, since from dirC, the folder .. points to its predecessor, dirB. The following figure shows the interpretation of this route as well as the equivalent of the “..” and “.” Folders.

You might be interested in
At one college, the tuition for a full-time student is $6,000 per semester. It has been announced that the tuition will increase
Alina [70]

Answer:

  1. var projected_fee = 6000;  
  2. for(var i = 1; i <= 5; i++){
  3.    projected_fee = projected_fee * 0.02 + projected_fee;
  4.    console.log("$" + projected_fee.toFixed(2));
  5. }

Explanation:

Firstly, create a variable, projected_fee, and set the initial tuition fee value to it (Line 1).

Next, user a for loop that run for 5 times to repeatedly calculate the projected_fee based on 2 percent of increment rate (Line 4) and display the projected fee to console terminal (Line 5). The output should be

$6120.00

$6242.40

$6367.25

$6494.59

$6624.48

8 0
3 years ago
If you enter the search "genetically modified foods" in a database, the double quotes around the three words will:
In-s [12.5K]

Answer:

Have a more specified search

Explanation:

If you do this in G0OGLE Then it will be the same thing all it basically does it narrow down the search to find more of what you want

4 0
2 years ago
Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of
klasskru [66]

Answer:

the Format Painter feature

6 0
3 years ago
Suppose a local area network requires eight characters for a password. The first character must be a letter, but the remaining s
Elis [28]

Answer: 2037468266496

Explanation:

The question says first character must be a letter = A - Z ( 26 characters )

Others can either be letters or digits = digits with range 0-9 ( 10 digits )

From the second to the seventh character can either be digits or letter hence we have ( 10 +26 ) = 36 chances

Considering rule of product

Number of chances/outcomes of the password = ( 26×36⁷)

The power of 7 was as a result of remaining seven characters can be either a letter or digits.

5 0
3 years ago
Gas giants have rings and satellites.
user100 [1]
Gas giants DO have rings and satellites.
It's true.
6 0
3 years ago
Read 2 more answers
Other questions:
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • How can you tell if a website is secure
    13·1 answer
  • It's better to create tables just by starting typing in the data that you want the table to store. There is no need to name fiel
    6·1 answer
  • Knowing what you know about today’s video games, imagine what it would look like if you had to create a modern-day version of Sp
    6·1 answer
  • Need help please will mark brainliest
    15·1 answer
  • Gina is upgrading your computer with a new processor. She installed the processor into your motherboard and adds the cooling sys
    9·2 answers
  • 3.4 lesson practice quiz edhesive
    11·1 answer
  • What are some ways you can use the Effect Options dialog box to customize animations in a presentation? Check all
    6·2 answers
  • An online bank wants you to create a program that shows prospective
    12·1 answer
  • If a computer uses 500 characters, how many bits this system requires to give different code to all characters?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!