1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FrozenT [24]
3 years ago
10

In a cron table entry, what field specifies the absolute pathname to a command that is to be executed?

Computers and Technology
1 answer:
liraira [26]3 years ago
6 0
The last one. You can also pass arguments to the command.
You might be interested in
The _____ element, a hypertext markup language (html) metadata element, contains a collection of metadata elements that describe
Butoxors [25]
The "head" element, a hypertext markup....
Missing word is head
5 0
3 years ago
Read 2 more answers
Systematically tackling the threats and vulnerabilities in the seven individual domains of a typical IT infrastructure helps you
Lorico [155]

Answer:

<u>Organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. </u>

Explanation:

The seven domains in an IT structure can be identified as:

  1. User Domain,
  2. Workstation Domain,
  3. LAN Domain,
  4. WAN LAN Domain,
  5. Remote Access Domain,
  6. WAN Domain,
  7. and System / Application Domain

They can be configured as portals for countermeasure failure and intruders, so it is crucial for organizations to look for ways to protect these domains to prevent unauthorized access to private data.

Therefore the relevance of the systematic approach to threats and vulnerabilities, which will assist in organizing the roles, responsibilities and responsibilities for risk management and mitigation.

7 0
3 years ago
Explain the need for data structures when developing software.
Sergio [31]

Solution:

It is  important because, it has to do operation on so without, data structures and algorithms.

It performs these operation:  

 1)Take an input

2) Process it  

3) Give back the output.

The input can be in any form, for ex while searching for directions on google maps,  the starting point and the destination as input to google maps, while logging in to any social sites, We have to give our email and password as input and so on.

Similarly, in the third step, the computer application gives us output in some form or the other.

To make this process efficient, we need to optimize all the three steps.

4 0
3 years ago
WHO GIVE THE CONCEPT OF INTERNET?
viktelen [127]
Google, Apple, or even Dell
6 0
2 years ago
Which of the following scenarios describes an IT
slava [35]

Answer:

-checking social media networks during working hours

-surfing the Internet during working hours for what to do on the weekend

-downloading a favorite band’s latest album from a file-sharing service

Explanation:

they are all correct on edg.

8 0
2 years ago
Read 2 more answers
Other questions:
  • In the u.s.all financial institutions are required to conduct business at a physical location only
    9·1 answer
  • What view and zoom setting do you need for true WYSIWYG display? Why?
    14·1 answer
  • Which of the following options would you use when saving a document with a new filename? *
    12·2 answers
  • How many times do you usually use npm?<br> Put your answer in the box.
    6·1 answer
  • A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But af
    11·1 answer
  • Which is not an element of photography? a Cropping b Height c Directional Lighting d Framing
    11·1 answer
  • Which of the below statements describes the purpose of HTML 5 - check as many as apply
    9·1 answer
  • Enum Digits {0, 1};
    10·1 answer
  • You have this code in your program.
    7·1 answer
  • "Bookings are to be stored in three separate
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!