1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
3 years ago
14

On a Linux system it is considered bad manners to create files and folders in the _______________ directory.

Computers and Technology
1 answer:
guapka [62]3 years ago
5 0

Answer:

Root

Explanation:

Linux is an open source operating system which receives command from the user and communicates with the hardware, and in Linux the root directory is the top level directory that contains all other directory, it is not recommended to create files and folders in  the root directory because the commands the user enters may change files that the operation system may depend on for usage.

You might be interested in
What is (9x - 3) - 7^2, if x=6.
attashe74 [19]

Answer:

23

Explanation:

you will see trust me, I had this question but cant tell with writing

3 0
3 years ago
Read 2 more answers
Explain the main difference between using a list and a table to organize information in a web page?
Ratling [72]

Answer:

A table is fine till we need rows and columns. However, the list is quite more flexible. Hence, the table is always going to be a great choice when the data needs to be expressed as a table. However, if we want a more flexible view for a list of products or items with quite a long list of properties. Also, we can have any level of indented lists within the list. This can be done with the help of tabs, and bullets and numbering. Both ordered and unordered lists are possible. And that proves lists are more flexible. And the main purpose of the table is the row and column type of formatting on the web page, where we create a table and then hide the borders.

Explanation:

Please check the answer section.

5 0
3 years ago
Would you expect all the devices listed in bios setup to also be listed in device manager? would you expect all devices listed i
katen-ka-za [31]
<span>Would you expect all the devices listed in bios setup to also be listed in device manager? = Yes
Would you expect all devices listed in device manager to also be listed in bios setup? = No, the BIOS doesn't know anything about your peripherals etc. that is all managed by the OS.</span>
6 0
3 years ago
When using the camelCase naming convention, the first word of the variable name is written in lowercase and the first characters
Lerok [7]

Answer:

The answer is "True".

Explanation:

CamelCase is an invitation for the name composed of several words, it includes in one word with the first letter of each several words capitalized so, that every word which makes up into the name can be understood quickly, into this tag convention.

  • It provides capitalize on the first letter of each word, which increases the ability to read.
  • It mainly uses programming variables, SOAP, and XML.
3 0
3 years ago
​
mash [69]

Answer:

Hey mate......

Explanation:

This is ur answer....

<em>For many users, uploading files is quite a bit slower than downloading files. This is usually normal, because most high-speed Internet connections, including cable modems and DSL, are asymmetric — they are designed to provide much better speed for downloading than </em><em>uploading.</em>

Hope it helps!

Brainliest pls!

Follow me! ;)

5 0
2 years ago
Other questions:
  • A computer can successfully ping outside the local network, but cannot access any world wide web services. what is the most prob
    5·1 answer
  • You use the ____ operator to reverse the meaning of a boolean expression.
    5·1 answer
  • why does it not let me create a new account when i log out of this one and go to join now after i fill everything out it wont le
    11·1 answer
  • هل تعتبر الشاشة من الوحدات الإدخال والاخراج​
    9·2 answers
  • Which function should be used to display a value based on a comparison ?
    6·1 answer
  • How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help
    14·1 answer
  • Note that common skills are listed toward the top and less common skills are listed toward the bottom. According to O*NET, what
    8·1 answer
  • In this image, we are clicking a button on the Quick Access Toolbar. What will happen
    6·1 answer
  • How to check the speed of your internet connection on macbook air
    8·1 answer
  • Need help finding the totals and with the empty spots
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!