1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
4 years ago
11

"what command can be used on most linux distributions to find the directories where the man pages are kept"

Computers and Technology
1 answer:
BartSMP [9]4 years ago
6 0

Answer:

Base name or -b command is used to locate only match directory in Linux.

Explanation:

base name can   primarily be used in shell script.

As we know that base name can be described  as a standard UNIX computer program. When we give a path name to any base then it  deletes each and every  prefix up to the last slash character and give back the result. base name can be defined in the Single UNIX Specification


You might be interested in
Which is an example of a student practicing ethical behavior online??
professor190 [17]

Answer:

Zohar abides by his school’s Internet policy and does not visit questionable websites.

Explanation:

Only the first one is ethical behavior. The second choice is an example of plagiarism. The third & fourth choices could be examples of cyberbullying.  

4 0
3 years ago
Read 2 more answers
Given two Strings String s1 = "11223351638791377189728193"; String s2 = "983763978669976862724569282405742578"; and String varia
inn [45]

Answer:

import java.math.BigInteger;  

public class Main {  

public static void main(String[] args)  {  

String s1 = "11223351638791377189728193";   String s2 = "983763978669976862724569282405742578";

BigInteger num1 = new BigInteger(s1);  

BigInteger num2 = new BigInteger(s2);  

BigInteger product = num1.multiply(num2);  

String s3 = product.toString(10);

System.out.println(s3);  

}  

}  

Explanation:

Because s1 and s2 contain large integers, the program need the biginteger module in other to compute the products of s1 and s2 when converted to integers.

This line initializes the two string variables s1 and s2

String s1 = "11223351638791377189728193";   String s2 = "983763978669976862724569282405742578";

The next two lines convert the two strings to BigInteger. This allows the program to multiply large integers

<em> BigInteger a = new BigInteger(s1);   </em>

<em>BigInteger b = new BigInteger(s2);  </em>

<em />

This computes the product of the two big integers

BigInteger product = num1.multiply(num2);  

This converts the product to String s3

String s3 = product.toString(10);

This prints s3

System.out.println(s3);  

}  

}  

7 0
3 years ago
A robot worker and a human worker are both vulnerable to
Lady bird [3.3K]

Answer:

fire

Explanation:

4 0
4 years ago
Although a tablet can connect to a cellular network, it cannot be used as a
Misha Larkins [42]

Answer:

A tablet can have mobile data such as MetroPCS. But the tablet can not make phone calls or texts.

7 0
3 years ago
Read 2 more answers
The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is
rewona [7]

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

8 0
3 years ago
Read 2 more answers
Other questions:
  • The following declaration appears in a program: short totalPay, basePay = 500, bonus = 1000; The following statement appears in
    9·1 answer
  • PLEASE HURRY What data unit is addressed based on the IP address of the recipient? a. packet b. frame c. segment d. section
    9·2 answers
  • 3. Which of the following statements is true of a time management plan? 35 POINTS
    9·2 answers
  • For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
    7·1 answer
  • What do you think Amazon should fix?
    13·2 answers
  • Which of the following was most likely used to apply red background and font to some of the cells in column D?
    10·1 answer
  • Write a program that prints the sum of the even numbers and the products of odd numbers on the screen
    10·1 answer
  • What do earthquakes and tsunamis have in common?
    13·1 answer
  • Another name of computer program is
    6·1 answer
  • During the ___ phase of a software development project, members broadly define the features that the software should include
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!