1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
4 years ago
12

Which degree is usually required for librarians who manage library holdings and assist patrons with book, periodical, and comput

er-based research?
A. Master's degree
B. Bachelor's degree
C. PhD
D. high school diploma
Computers and Technology
2 answers:
IRISSAK [1]4 years ago
6 0

i think C

help from Russia


Vlad1618 [11]4 years ago
4 0

Answer:PHD

Explanation:

You might be interested in
The directory "a" contains its subdirectory "b" and there is no other entry in the directory "a". You want to display "the conte
Svet_ta [14]

The answer assumes that the question is about which command help accomplish display directory contents in Unix-like operating systems.

Answer:

The command is <em>ls</em>.

Explanation:

The command <em>ls</em> (short for <em>list</em>) displays a variety of important information in different ways regarding any directory contents. Because of this, it is probably one of the most used commands in Unix-like operating systems.

Any directory can contain directories and files of different sizes, recently created/modified, attributes like permissions for being accessed, and, with this command, we can see all this information by size, chronologically, by owner, and/or by many more ways.  

In the question, we can accomplish to list that the directory "a" contains its sub-directory "b" and no other entry using the next line of code:

Command-line 1: \\ ls\; a (<em>the command "says": display content of a</em>)

Result: b

The result is only the directory <em>b </em>because there is no other entry in it.

To display more information regarding <em>b</em>, we can use the many options available for the command <em>ls</em>, like <em>-a</em> (all entries), <em>-d</em> (only directories), <em>-l</em> (long listing format), and so on, e.g. ls -a  A (display all entries in directory A, included hidden files).

6 0
3 years ago
an attacker uses the nslookup interactive mode to locate information on a domain name service (dns). what command should they ty
sashaice [31]

The command should they type to request the appropriate records for only the name servers is  set type=ns .

<h3>What is Domain Name Service?</h3>

The hierarchical and decentralized naming scheme used to identify machines reachable over the Internet or other Internet Protocol networks is called the Domain Name System. Domain names are linked to various types of information by resource records in the DNS.

The application service known as DNS transforms an IP address into a more recognizable and memorable name. When utilizing the Internet, any uniform resource locator (URL) entered into any Web browser's location box will be converted into a specific IP address by one of the millions of DNS servers.

Both interactive and non-interactive modes of Nslookup can be used. Enter nslookup at the command line and press return to use in interactive mode. An nslookup command prompt ought to appear. At the command prompt, type nslookup options to use in non-interactive mode.

Hence, The command should they type to request the appropriate records for only the name servers is  set type=ns .

To learn more about Domain Name Service refer to:

brainly.com/question/13883687

#SPJ4

6 0
2 years ago
When you use an external style sheet with an HTML document, you get all but one of the benefits that follow. Which one is it?
IRISSAK [1]

Answer:

Your CSS files are smaller and simpler.

Explanation:

External stylesheet are used in HTML pages to keep the HTML content and its styling separate. When using external stylesheet all the style rules are defined in CSS files and HTML files only contain the HTML code.

By using external style sheet,

  • One can make HTML code smaller and simpler.
  • One can use the same stylesheet in multiple HTML pages and thus provide styling to multiple pages.
  • With external stylesheet one can alter the single stylesheet code and its effect can be seen on all pages which are using that stylesheet.

Using external stylesheet has no effect on the content of CSS files. The CSS files will contain the same CSS style rules that are defined for any HTML page within the page.

Thus using external stylesheet doesn't make CSS files smaller and simpler.

6 0
4 years ago
Suppose that a flow network G=(V,E)G = (V, E)G=(V,E) violates the assumption that the network contains a path s⇝v⇝ts \leadsto v
Alex17521 [72]

Answer:

Hi your question is poorly written attached below is the complete question

answer : TRUE ( a )

Explanation:

The statement about a flow network is true because when there is a vertex in the flow network that inhibits the source from reaching the sink, the vertex can be successfully removed without altering the maximum flow in the flow network.

as given in the question ;  if f(u,v) = f(v,u) =0   we can remove the vertex.

4 0
4 years ago
In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors m
Artemon [7]

In the game of $Mindmaster$, secret codes are created by placing pegs of any of seven different colors into four slots. Colors may be repeated, and no slot may remain empty. 2401 secret codes are possible.

<u>Explanation:</u>

Mastermind is a board game that was developed by Mordecai Meirowitz, in 1971. The Code maker sets a secret code, then the Codebreaker attempts to meet the code using logic, deduction. Behind each move, the Code maker provides hints to the Codebreaker. Make the code even more indirect by using multiple pegs of the same color or by leaving one or more peg holes empty. With so many feasible code sequences, every game is confirmed to be a brain teaser.

7 colors with 4 slots and repetition of color are accepted so 7^4 is 2401.

3 0
3 years ago
Other questions:
  • To what device, inside the computer, do all other devices connect
    10·2 answers
  • ____ is used specifically for the purpose of recording keystrokes, logging the programs or web sites accessed, or otherwise moni
    8·2 answers
  • Is social media and advancement of technology causing our society to become less social?
    13·1 answer
  • Write a function stats that takes an array and the number of elements in the array. Then, it computes and prints the minimum val
    8·1 answer
  • We wish to design a decoder, with three inputs, x, y, z, and eight active high outputs, labeled 0, 1, 2, 3, 4, 5, 6, 7. There is
    5·1 answer
  • For what purpose power point is used?​
    5·2 answers
  • When is the next Great Conjunction between Jupiter and Saturn?​
    13·1 answer
  • How do I mark brainlyist
    7·2 answers
  • According to the test for x-ray film freshness, the film is fresh and has been properly stored and handled when the processed fi
    5·1 answer
  • (2 points) starting from the root node, we want to populate a bst with the keys in a given list without altering the key order.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!