1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
12

Hey!! Can u help me please!!​

Computers and Technology
2 answers:
BartSMP [9]3 years ago
4 0

1. deletes file named school.txt

2 copy Aic.txt to windows

3. display the volume label and serial number if logical drive

4. remove directory named ASIAN

5.lists all files and sub directories of OS

6. displays current date and time

Answer:

Explanation:

what guy under me coreect

igor_vitrenko [27]3 years ago
3 0

1. deletes file named school.txt

2 copy Aic.txt to windows

3. display the volume label and serial number if logical drive

4. remove directory named ASIAN

5.lists all files and sub directories of OS

6. displays current date and time

You might be interested in
Describe the benefits and drawback of using virtualisation on a single machine and also in a cluster environment
Sedbober [7]

Answer:

 Virtualization is the technology that is used to create virtual representation and version of the different devices like software, many storage devices and server.

It also help in organize the working framework where the structure isolates the asset into at least one execution situations.

 The benefits of using the virtualization on the single machine are:

  •  The virtualization increased the productivity when it used in the cluster environment.
  •  We can able to access the different resources faster.
  •   The data center management is simple while using the virtualization in the cluster environment.

 The drawback of using virtualization on single machine are:

  • The virtual machine is less efficient as compared to the real machines.
  • The virtual machine indirectly access the computer hardware system so that is why it is less efficient and also consume more power to run the system.  

5 0
3 years ago
Pls help now the question is very hard someone help me pls​
satela [25.4K]

Answer:

The answers are "Option a, Option b, Option d, and Option c".

Explanation:

  • The Traceroute utilizes the "Internet Control Message Protocol" for transmit and receive echo-request and echo-reply messages. This is most often used in the echo packets of specified interval to live (TTL) quantities.
  • The Transport layer will be the next but is usually directly linked with the same name layer in the OSI model. Functions involve message fragmentation, acknowledgment, traffic management, session parallelization, error detection, as well as message rearranging.
  • Leaders generally fully involve one or even more workers in design buildings.
  • 67 was its UDP port number which is used as the port number of a database. So although UDP port number 68 is being used by the client.
4 0
3 years ago
The linux/unix command __________ can be used to search for files or contents of files.
Nana76 [90]
The `grep` command is used for this. https://man7.org/linux/man-pages/man1/grep.1.html
8 0
2 years ago
2. (8 points) When creating the Academic Database, there were several instances of data
Bad White [126]

Answer:

See explaination

Explanation:

An Academic Database deals with the information pertaining to the records of students of an institute. The various fields which can be associated with a student are Name, Unique Identification Number, Marks in various subjects, Grades, Courses Taken and so on. Most of the fields mentioned above have some or other form of validation that is required for the DB to be consistent and follow the basic properties of a database.

One field where range validation can be used is MARKS. In the marks field, the range of marks will be say 0 to 100 and anything below 0 or above 100 must be reported to the database administrator. Another field where we can apply a range validation is AGE in which the range of age allowed could greater than say 10, if it is a college and maximum age could be say 60. Thus, the range check on the AGE field is 10 to 60.

One field where choice validation can be used is GENDER. In the gender field, there could be multiple choices like Male, Female and Others. Thus, out of the available choices we have to select only the available choice and only one choice must be selected where we can apply choice validation. Another field is COURSE, where we can have a list of courses a student can opt for and out of the available courses can select one.

Thus, there are multiple fields where we can apply various types of validation and it is important to explore the area for which the DB has been created understanding all the scenarios and attributes of the problems that are associated with that area.

8 0
4 years ago
Brief description email etiquette​
Solnce55 [7]

Answer: See explanation

Explanation:

Email etiquette is defined as the code of conduct which helps to guide the behavior when people send or respond to emails. Some of ail etiquette include:

• Using proper and correct grammar and punctuations.

• Replying quickly too emails.

• Including a clear and direct subject.

• Proofreading of messages.

• Cautious with humour.

• Sending of smaller files and compressing large files.

7 0
3 years ago
Other questions:
  • Which of the following is NOT one of the responsibilities of the Federal Reserve?
    10·1 answer
  • What is computer virus?
    8·1 answer
  • On most computers, the default font size in word is ____. 8 11 14 16
    8·2 answers
  • write code to declare variables for s0 with a value of 12.0, v0 with a value of 3.5, a with a value of 9.8, and t with a value o
    13·1 answer
  • Write a (java) program with a class called Sum1, using a while loop to add 10 numbers entered from the key-board.
    5·1 answer
  • What are the step by step instructions on how to rename a document(without opening it) that is filed in my computer/my documents
    9·1 answer
  • Computer hardware without software is usless and compyrersoftware without hardware is meaningless discuss
    6·1 answer
  • You can select multiple words by using the ______ keys repeatedly.
    6·1 answer
  • The "great big secret" Ohanian talks about is the idea that:
    15·1 answer
  • PYTHON!
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!