1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zarrin [17]
4 years ago
15

In command prompt, Whats a command that will list only .ini files in C:\Windows\System32 directory?

Computers and Technology
2 answers:
Anika [276]4 years ago
8 0

There are two commands that need to be executed:

<em>cd</em><em> </em><em>C</em><em>:</em><em>\</em><em>W</em><em>i</em><em>n</em><em>d</em><em>o</em><em>w</em><em>s</em><em>\</em><em>S</em><em>y</em><em>s</em><em>t</em><em>e</em><em>m</em><em>3</em><em>2</em>

<em>dir</em><em> </em><em>*</em><em>.</em><em>ini</em>

Let's analyse them.

First we have the cd command aka change directory command. It's very simple.

cd {directory path}

Whenever you enter this command windows operating system will internally switch the path parameter of the working terminal to your desired path in this case windows system32 directory.

Then we have another command. The dir or directory command.

dir {directory path}

Directory command will list you all files and subdirectories in a certain directory.

{file name}.{file extension}

If we use * for file name you are telling your os that all you care is file extension so it will return you all files in a certain directory who possess the same file extension.

Hope this helps.

r3t40

Ber [7]4 years ago
3 0

Answer:

The dir command is a Command Prompt command that's used to display a list of the files and subfolders contained in a folder.

hope it helps

You might be interested in
PLEASE HELP WILL MARK BRAINLIEST
Sergeeva-Olga [200]
I believe it’s boundaries
3 0
2 years ago
Read 2 more answers
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
kap26 [50]

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

7 0
3 years ago
When saving a document or drawing, you determine the destination folder in which the file will be saved by?
bekas [8.4K]

making a selection in the Save in: box.<span>

</span>
8 0
3 years ago
Read the following example cover letter:
enot [183]

Answer:

All should be added.

Explanation:

All of these are important to your cover letter to make it seem professional.

Hope this helped

3 0
3 years ago
Read 2 more answers
An organization’s IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
emmasim [6.3K]

Answer:

The correct answer is (a) Remove the affected servers from the network.

Explanation:

Solution:

Now, since the organisation top priority is more of  containment over eradication, an outbreak code that is hostile as an can be suppressed effectively by removing the web server completely from the over all network facilities or infrastructure.

Also, if the affected servers are not removed, it might affect the integrity, confidentiality of sensitive materials or documents which will be exposed to the outside world by the attacker.

4 0
3 years ago
Other questions:
  • Which online text source would include a review of a new TV show?
    9·2 answers
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • list six external parts or peripherals of a computer system and identify which are output and which are input devices
    8·1 answer
  • Disk requests come in to the disk driver for cylinders 10, 22, 20, 2, 40, 6, and 38, in that order. A seek takes 6 msec per cyli
    6·1 answer
  • (3 points) Write a program to process two large chunks of data (e.g., a large 3D array and an array of self-defined structures w
    11·2 answers
  • ______involves encoding information using fewer bits than the original representation Group of answer choices
    6·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • Supp guees how your dayyyyyyyyyyyy
    10·2 answers
  • Lasses give programmers the ability to define their own types. <br><br> a. True<br> b. False
    10·1 answer
  • a functional policy declares an organization's management direction for security in such specific functional areas as email, rem
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!