1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
joja [24]
3 years ago
10

You have a bunch of text files in your home directory, and you are trying to find which ones contain the name "Backman". You are

not certain if the name is all lowercase, has only the first letter capitalized, or is all caps. What command would you type to search within all the files in your current working directory for the name "Backman", and ignore case?
Computers and Technology
1 answer:
Elodia [21]3 years ago
6 0

Answer:

grep -i backman *

Explanation:

grep command is a unix command line utility that is use to search for plain text.

Running

grep -i backman *

command will bring back all occurrence of backman in the directory while ignoring the case whether it's upper or lower.

grep is the keyword

The -i means grep should ignore the case.

Then backman is the search word to find.

The wildcat (*) means all occurrence of backman should be returned.

You might be interested in
Careers in information technology deal with
podryga [215]

Answer:

A

Explanation:

A would be the best possible answer

3 0
3 years ago
Read 2 more answers
Because mobile users consume information one screen at a time, you should ________ when you're writing to them.
Fiesta28 [93]
Answer:  C
<span>Explanation:  C) Mobile users read messages one screen at a time; therefore, divide your message into small "chunks" of information.</span>
4 0
3 years ago
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
2 years ago
When you start an online course, what should you do to make sure you have access to college resources
VARVARA [1.3K]

As a student starting an online course, you should explore the college website to make sure you have access to college resources.

<h3>What is an online course?</h3>

An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.

As a student starting an online course, you should do the following to make sure you have access to college resources:

  • Explore the college website.
  • Bookmark links to your course.
  • Search for information with regards to advising, degree requirements, and financial aid.

Read more on online course here: brainly.com/question/14591988

#SPJ1

3 0
2 years ago
Why do you think that backlighting is used in so much of Sheldon’s photography?
Marianna [84]

Answer:

So you see the person better

Explanation:

4 0
4 years ago
Read 2 more answers
Other questions:
  • "bing ads keyword planner allows you to search for new keywords using a phrase, website, or category. from which bing ads tabs c
    13·1 answer
  • The students of a college have to create their assignment reports using a word processing program. Some of the questions in thei
    5·2 answers
  • What is the difference between primary storage, secondary storage and off-line storage?
    5·1 answer
  • When adding shapes to a presentation, the outline can be one color, and the fill must be the exact same color.
    12·2 answers
  • He flow of electric charges through a material describes an electric _______.
    10·1 answer
  • Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
    8·1 answer
  • An organization is conducting a study to see if hazardous waste sites pose health risks for cancer or other conditions, such as
    12·1 answer
  • Take points for free who are new and enjoye them
    9·2 answers
  • Help I will mark BRAINLIEST !<br> Explain looping as an invention strategy. Why is it helpful?
    12·1 answer
  • what is the worst-case big o running time for finding the maximum value in an array of size n by scanning from left to right and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!