1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Likurg_2 [28]
3 years ago
15

Jamie is using the UNIX file system to work on his computer. He puts a dot before the file extension to separate it from the fil

ename. How does the UNIX file system interpret the dot?
Computers and Technology
2 answers:
ExtremeBDS [4]3 years ago
8 0

Answer:

As a seperator before a file extension

As a character in a file name

As the name of the current folder

Or as the name of the parent folder

Explanation:

The dot is simply another character in the file name. It is only specific applications that detect the dot as preceding a file extension.

pogonyaev3 years ago
5 0

Answer:

<em><u>The answer is</u></em>: <u>One more character within the structure of the file name with its extension.</u>

Explanation:

The point between the name of the file and its extension is one more character that separates at the same time that joins the name with the extension.

However, <u>keep in mind that in the  (.) in the Working Directory</u> or act the directory in which we are operating at each moment of the session. It is represented by a period.

<em><u>The answer is</u></em>: <u>One more character within the structure of the file name with its extension.</u>

You might be interested in
What code would you use to create the login button?
Simora [160]

Go To This Web Page

https://www.w3schools.com/howto/howto_css_login_form.asp

5 0
3 years ago
Define what is a PC?
nekit [7.7K]

PC stands for Personal Computer (generic term) This definition appears very frequently and is found in the following Acronym Finder categories: Information technology (IT) and computers.

8 0
3 years ago
Read 2 more answers
Write a function which sorts the queue in order from the smallest value to the largest value. This should be a modified version
PilotLPTM [1.2K]

Answer:

#include <iostream>

using namespace std;

void swap(int *a,int *b){    //function to interchange values of 2 variables

   int temp=*a;

   *a=*b;

   *b=temp;

}

void sort(int queue[],int n)

{

   int i,j;

   for(i=0;i<n;i++)      //to implement bubble sort

   {

       for(j=0;j<n-i-1;j++)

       {

           if(queue[j]>queue[j+1])

               swap(queue[j],queue[j+1]);    //to swap values of these 2 variables

       }

   }

}

int main()

{

   int queue[]={6,4,2,9,5,1};

   int n=sizeof(queue)/4;  //to find length of array

   sort(queue,n);

   for(int i=0;i<n;i++)

       cout<<queue[i]<<" ";

   return 0;

}

OUTPUT :

1 2 4 5 6 9

Explanation:

In the above code, Queue is implemented using an array and then passed to a function sort, so that the queue can be sorted in ascending order. In the sort function, in each pass 2 adjacent values are compared and if lower index value is greater than the higher one they are swapped using a swap function that is created to interchange the values of 2 variables.

7 0
3 years ago
The _____________ loop allows the receiver to communicate with the sender in the imc process.
postnew [5]
Feedbacks
perhaps !!
<span>The feedback loop allows the receiver to communicate with the sender in the imc process.</span>
4 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
Other questions:
  • You have created a number of different documents using several applications including word, excel, and powerpoint. these files a
    10·1 answer
  • Which entity might hire a computer systems analyst to help catch criminals?
    14·2 answers
  • User-system interaction is?
    11·1 answer
  • What does the line of red semicircles mean on a weather map
    11·1 answer
  • 3.3 Code Practice: Question 1
    6·1 answer
  • A signal has a spectrum from 0 to 145 Hz, as shown below. It is sampled at a rate of 295 Hz. Find the region of the baseband spe
    5·2 answers
  • What is it with the order of operations
    9·1 answer
  • Please help me please help me.​
    10·1 answer
  • Write ONE SQL statement for each of the following tasks. Note that you can only use conditions specified in the task description
    5·1 answer
  • How to run angular project from github.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!