1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ulleksa [173]
3 years ago
9

Write a script to check command arguments (3 arguments maximum). Display the argument one by one. If there is no argument provid

ed, remind users about the mistake. If there is an easy way to use a loop to get all arguments, use it?a) Display the source code in an editor b) Execute your script in the terminal, and display the command and the result
Computers and Technology
1 answer:
serious [3.7K]3 years ago
7 0

Answer:-args (

if:args=true

-cont

if:args=false

-cont investigating

if:args=irrelevance

-loop restate args

)

compile exec

Explanation:

You might be interested in
The term ________________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, se
Vinvika [58]

Answer:

The term "Local storage"denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term "hosted storage," "Internet storage" or "cloud storage." denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network

4 0
3 years ago
Read 2 more answers
Sharon is a skilled professional who operates logging equipment.
Viktor [21]
Natural resource systems hope this helps

7 0
3 years ago
Read 2 more answers
What is a way to minimize techniacl problems with your computer.
Vsevolod [243]
Have you tried turning it off and back on.Try that if that does not work then try debugging it
3 0
3 years ago
Read 2 more answers
A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web
Zielflug [23.3K]

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

8 0
3 years ago
Which of the following best describes deflation (everfi)
lana66690 [7]

Answer:

I think that is

c. An increase in purchases of goods and services

5 0
3 years ago
Other questions:
  • After modifying a numbered list in her presentation, Su notices the numbers and the text are too close to each other. She knows
    9·1 answer
  • What happens when the computer is thrashing? quizzlet?
    12·1 answer
  • When saving a document or drawing, you determine the destination folder in which the file will be saved by?
    6·1 answer
  • What are two statements that are true about using an external hard drive for backing up data
    14·1 answer
  • Given the function definition below, what is the effect of thecall:
    7·2 answers
  • Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then prel
    8·1 answer
  • Which type of loop is best if you do not know how many times you need the loop to run?
    8·1 answer
  • CSNET Stand for in a computer
    11·1 answer
  • Create a medical report for Wellness Hospital. Mention the hospital name as the heading and the report name as the subheading. T
    14·1 answer
  • Which are ways that technology keeps you hooked?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!