1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reil [10]
3 years ago
13

In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:

Computers and Technology
1 answer:
mariarad [96]3 years ago
4 0

Question Completion with Options:

O tabs

O comma (,)

O colon (:)

O backtick (')

Answer:

In many UNIX/Linux data and configuration files are "fields". Sometimes these fields are separated by:

O tabs

O comma (,)

O colon (:)

Explanation:

A UNIX/Linux data and configuration file is a local program file that controls the operation of the program.  Such files are usually static and are not created to be in executable binary. The files are stored in subdirectories. Backticks are not used to separate fields.  But tabs, commas, and colons can be freely used.  Configuration files, which are coded, provide the required parameters and initial settings to operate computer applications.  Data files are not executable like configuration files but are used by applications as input and output data to be read or viewed.

You might be interested in
To prevent injury when pulling a nail be sure the material holding the nail is
sattari [20]

I think the answer may be sturdy? (I am not sure)

5 0
3 years ago
Cual de las siguientes es una desventaja del uso de las computadoras?
natka813 [3]
Answer: c
Explanation:
7 0
3 years ago
In general, the outside _____ and sleeves of the isolation gown and outside front of the goggles, mask, respirator and face shie
diamong [38]
The answer to this question is the letter "A" which is TIES. In general, the outside TIES and sleeves of the isolation gown and outside the front of the goggles, mask, respirator and face shield are considered "contaminated" regardless of whether there is visible soil.
7 0
3 years ago
Read 2 more answers
A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in t
olga_2 [115]

Answer: Computer's BIOS

Explanation:

Following the information given in the question, the highest level of security that is offered by LoJack can be achieved when Persistence Module resides in the computer's BIOS.

The BIOS (basic input/output system) refers to the program which the microprocessor of a computer uses in starting the computer system when the computer is powered on. It should also be noted that the BIOS is used in managing the data flow that exist between the operating system of the computer and the attached devices like the keyboard, hard disk, mouse, etc.

8 0
3 years ago
Help with this pleaseeeeeee​
slavikrds [6]

Answer:

fiber optic because It is thinner than the others in the list

8 0
3 years ago
Other questions:
  • EASY AND I GIVE BRAINLIEST!!! What is a good jeopardy question about operating systems?
    6·1 answer
  • The different concepts in the architecture operating model are aligned with how the business chooses to integrate and standardiz
    10·2 answers
  • in some caes before carrying out a command a program may ask you to provide may ask you to provide more information or to make a
    6·1 answer
  • You are using a tool on your computer to organize a variety of files in folders. what is the term for this kind of tool?
    14·2 answers
  • Write a program that accepts 5 number and arrange them in ascending order​
    7·1 answer
  • Which BEST identifies the primary function of the key words above?
    5·1 answer
  • Suppose users share a 1-Gbps link. Also, suppose each user requires 200 Mbps when transmitting, but each user only transmits 30
    5·1 answer
  • How should resumes and cover letters be written to help you obtain a job that meets your
    14·1 answer
  • Explain the importance of technology in at least 100 words
    11·1 answer
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!