1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stich3 [128]
3 years ago
15

What is the command to list files in Unix and Unix like operating system?​

Computers and Technology
1 answer:
emmasim [6.3K]3 years ago
8 0

Answer:

In computing, ls is a command to list computer files in Unix and Unix-like operating systems. LS is specified by POSIX and the Single UNIX Specification.

You might be interested in
Describe data center technology and its relevance to modern-day cloud computing
Semmy [17]

Answer and Explanation:

Data center has developed over some stretch of time with new innovations and structures showing up in this industry.  

It incorporates everything to back and maintain a major business in the network.  

It sends all the framework for machines which incorporates support for applications and the machines' security.  

In modern day computing it assumes a significant role as it enables organizations to put everything remotely for the client.  

With this innovation client can run different commands and can tests programs for a considerable length of time or months, any time as client as a rule signs in a remote machine and works.

It likewise enables organizations as it to keep everything on the cloud and there are less odds of assaults as everything is brought together.

6 0
3 years ago
In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
Alexus [3.1K]
In ciphertext-only.

EXPLANATION: it is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. The attack is completely successful if the corresponding plaintexts can be extracted or, even better, the key.
3 0
3 years ago
windows 93 it is a website THE QUESTION IS WHAT IS THE FIRST THING THAT POPS UP WHEN YOU OPEN THE WEBSITE?
dybincka [34]

Answer:

A black screen with green text in the top left corner

Explanation:

8 0
3 years ago
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.
levacccp [35]

Answer:

A mobile device is a small, lightweight, power-conserving, computing device that is capable of wireless connectivity.

Explanation:

I guess say this considering a phone,watch,etc. all are small and mobile devices.

5 0
2 years ago
Which section of a PCM is responsible for sending the proper reference voltage to many of the sensors?
pishuonlain [190]

The section of a PCM that is responsible for sending the proper reference voltage to many of the sensors is the input sensor section.

<h3>What are PCM inputs?</h3>

The Powertrain Control Module (PCM) is known to be an input section of the PCM.

It is made up of the engine's ignition system, fuel injection system and also emission controls. The PCM is known to receives inputs a lot from different kinds  of sensors and switches.

Learn more about sensors from

brainly.com/question/26320121

8 0
3 years ago
Other questions:
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • The _device provides a means of communication between a computer and outer world.​
    14·1 answer
  • Which of the following is the general term used to describe software code that isdesigned to cause damage to a computer system?
    10·1 answer
  • When does MMF2 inactivate an Active object? A. When the score is higher than the game's previous high score B. When the player d
    15·1 answer
  • Which marketing claim do you see on the opening screen of the new words with friends
    14·1 answer
  • When sending an email to work colleagues you should NOT use ____________.
    8·1 answer
  • _______________ is the use of IT in communication. a) email b) Chatting c) FTP d) All of the above
    7·1 answer
  • Can you sue someone in brainly? How is this not relate to education?
    5·1 answer
  • What are the 3 rules of music<br><br> ps: there is no music subject so i had to put something else
    15·2 answers
  • Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his cre
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!