1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina CMI [18]
3 years ago
8

You can execute three main types of linux commands. what are they?

Computers and Technology
1 answer:
aleksandrvk [35]3 years ago
7 0
Forking, background, and finally foreground

You might be interested in
Why is the keyboard arranged in the QWERTY style?
ArbitrLikvidat [17]
Most of us were taught that the man who invented the keyboard created the QWERTY design to slow typists down. The faster someone typed, the more often the typewriter jammed
6 0
3 years ago
Read 2 more answers
Which of the following would be considered a primary source of information?
viktelen [127]
An original research report will be considered as a primary source
6 0
3 years ago
Which of the following represents a positive way to handle aggressive feelings and road rage?
omeli [17]

Answer:

i think that B and C are both right. But b is more a self positive way  than C sooo, its B

Explanation:

5 0
3 years ago
In 3–5 sentences, explain how telecommunications technology helps workers do their jobs more efficiently.
Anvisha [2.4K]
Technology helps business professionals, keep more organized, communicate better, and efficiently keeps businesses secure. Technology helps keep employee information and business paper work more organized using computers and software; while making it easier to communicate with employee's using e-mail and memo's. With better alarm systems, camera's and online banking, security measures are endless. 

Hope this helped :)  <span />
4 0
3 years ago
Discuss risks associated with people in cyber threat
BARSIC [14]

Answer:

1. Hacking of personal details.

2. Cyber harassment.

3. Hacking of business details.

Moreover it is a mental trauma for the victim too

Explanation:

6 0
3 years ago
Other questions:
  • Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
    10·1 answer
  • Gary lives in an area that receives high rainfall throughout the year. Which device would be useful to him to maintain his compu
    10·2 answers
  • Which of the following would be an example of a loss of record integrity in a
    12·1 answer
  • Other than a desktop computer, laptop, tablet ,or cell phone, discuss two other ways computers are used on our daily lives
    12·1 answer
  • In the early days of photography, cameras were limited to professional photographers because of the knowledge needed to work the
    15·2 answers
  • Discuss some of the technical and nontechnical issues that might come up in trying to establish a large grid computing project s
    14·1 answer
  • What are attributes and what role do they play with in a HTML document?
    11·1 answer
  • How do you code a video game
    11·1 answer
  • What is the relationship between interrupt and buffer <br>​
    6·1 answer
  • I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you w
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!