1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
3 years ago
12

Sally types documents that have a few numbers but mostly letters. To enter these numbers, she should use the

Computers and Technology
1 answer:
Pavlova-9 [17]3 years ago
6 0

Answer:

A. numbers  across the top row of the keyboard

Explanation:

You might be interested in
What is utility Software​
kirill [66]

Answer:

The Utility Software is system software that helps to maintain the proper and smooth functioning of a Computer System. Some examples are antivirus software, file management tools, compression tools, disk management tools.It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that benefit ordinary users.

4 0
3 years ago
Why is storage and important part of the computing process? It must be atleast five sentences.
worty [1.4K]

Your computer needs storage because the processor needs a place to perform its magic — a scratchpad for mad doodles, if you will. All computers need storage. ... Memory is where the processor does its work, where programs run, and where information is stored while it's being worked on.

And why five sentences?

3 0
3 years ago
A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whe
krok68 [10]
<span>Dynamic Network Address Translation (DNAT)</span>
7 0
3 years ago
Smoking is a REALLY good example of a choice that can have negative effects on the smoker's health, AND the well-being of others
kow [346]
There is not a question but I will say thanks, because I learned something!!! lucky me I don't have to worry because I am allergic to alcohol and tabacco
8 0
3 years ago
You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on
oksano4ka [1.4K]

Step 1 of 4

What command did you use to accomplish this task?

First of all, let us ask ourselves what manual pages or man pages are. Manual pages in Unix/Linux are sometimes referred to as an online form of software documentation. They are a set of pages that try to explain and expound every command available on your system. Further, these pages explain to you the specifics of what each command does and how to run them. And in this case, we can use two commands to search for all the commands that have the word "copy" in their name or description. The commands are “man –k copy” or “apropos copy”

Step 2 of 4

Are there any commands in this list that only a root user can execute? How are they indicated?

Yes. There are several commands in this list that only a root user can execute. If you would want to find out what these commands are, the best way to do that is to look at those manual pages that are indicated by the manual page section number. If it has a number 8, then a root user can execute this command

Let’s compare the cp command and the cpio command

If you do an apropos or a man page on the commands above, you will spot a few differences. The cp command is used to copy files and directories from source to target location while the cpio command copies files to and from archives. The available options are –a –b –d –f –i –l –L –p and several others. On the other hand, the available options for cpio are –0 –a –A –b –B –C –c –d –E and more.

Access and read the manual pages on three other commands that interest you either by using the command name or searching for them by related keyword (try using apropos)

affcopy command

NAME

      affcopy - reorder and recompress AFF files

SYNOPSIS

      affcopy [options] file1 file

      affcopy [options] file1 file2 file3 ... dir

      affcopy [options] file1 file2 file3 ... dir1 dir2...

OPTIONS

General options:

             -d     Print debugging information as well.

             -h     Help, print this message.

             -L     Recompress pages (preen) with LZMA (smaller but slower).

             -m     Just copy the missing segments.

bcopy command

NAME

      bcopy - copy byte sequence

SYNOPSIS

      #include <strings.h>

      void bcopy(const void *src, void *dest, size_t n);

DESCRIPTION

      The bcopy() function copies n bytes from src to dest.  The result is correct, even when both areas overlap.

RETURN VALUE

      None.

cifssd command

NAME

      cifsdd - convert and copy a file over SMB

SYNOPSIS

      cifsdd [OPERAND]...

      cifsdd OPTION

DESCRIPTION

      This tool is part of the samba(7) suite.

      Copy a file, converting and formatting according to the operands.

      bs=BYTES

          read and write up to BYTES bytes at a time (default: 4096)

      ibs=BYTES

          read up to BYTES bytes at a time (default: 4096)

      obs=BYTES

          write BYTES bytes at a time (default: 4096)

6 0
3 years ago
Other questions:
  • In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us
    7·1 answer
  • write a 〕ava program to sort a random list of 10 numbers entered b y user in an array using Selection Sort technique
    5·1 answer
  • Scientific models can be used for a variety of different purposes. Which of the following statements about scientific models is
    7·2 answers
  • An isotope of an element has:
    11·2 answers
  • Question 1 :The most common business firewall technique is to use a firewall server in conjunction with:This task contains the r
    11·1 answer
  • CHEMISTRY. metal+water》base+...............​
    12·1 answer
  • A filter is a camera accessory that is mounted on the optical path of the lens.<br> true or false
    6·2 answers
  • When a virtual machine is
    9·1 answer
  • How do I make time go by faster?? school is so boring gosh..
    10·2 answers
  • 14. How do digital libraries address the problem of digital exclusion?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!