1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina [24]
3 years ago
12

List out two ways to execute the script.​

Computers and Technology
2 answers:
castortr0y [4]3 years ago
7 0

Answer:

1) Execute Shell Script Using File Name. Use the shell script file name to execute it either by using it's relative path or absolute path as shown below

2) Execute Shell Script Using Source Command.

Alex777 [14]3 years ago
3 0

Answer:

Please refer to the given attachment.

Explanation:

Thank you

Stay safe, stay healthy and be blessed.

You might be interested in
14. In cell B14, create a formula without using a function that adds 1 to the value in cell B12 and then multiplies the result b
vagabundo [1.1K]

Answer:

The formula for the given problem is given below:

= (1+B$12)×B13

Explanation:

Immediately you do one, then you can autofill the formula to the mentioned range B15:B17 and then to C14 to H17

When been done correctly, this is how the formula will look in those cells if you do it correctly.

Check the file attached below to see it.

7 0
3 years ago
What is the difference between hardware and software?
alina1380 [7]
A Hardware is any physical device used in. You can touch hardware, but you cannot touch software. Hardware is physical, and software is virtual. (brainliest) ??
4 0
3 years ago
Which of the following solutions should an administrator use to reduce the risk from an unknown vulnerability in a third-party s
ser-zykov [4K]

Answer:

A. Sandboxing

Explanation:

The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.

4 0
3 years ago
Hello guys. .... ............ .is a camputer that stores data and programs that people on a network can access? What is the answ
Vikentia [17]
I do t know the answer to this but i think tou can firger it iut food luck so good luck on it also I think it can be done it is Poe Poe is your answer
4 0
3 years ago
When students have computer trouble they usually are expected to
Kitty [74]

Answer: A) Make any simple fixes on their own.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Type dig www.example A in order to get the IP address of www.example. What’s the TTL of the A record returned in the response? W
    9·1 answer
  • What did basic elements of music look like in the Twentieth Century period?
    6·1 answer
  • The concept of _________________ comes from the acknowledgment that data changes form and often gets copied, moved, and stored i
    7·1 answer
  • A local reaction will occur at the site of the exposure, such as irritations or damage to the skin, eyes or lungs true or flase
    14·1 answer
  • A personal business letter is a letter that is ____.
    13·1 answer
  • Compare and contrast the role that business users play when software is developed using Waterfall and Agile software development
    10·1 answer
  • Which documents might an employer expect to find in a career portfolio?
    15·2 answers
  • The _____ method randomly rearranges the items in the list provided in the parentheses.
    5·2 answers
  • 12. Your project specifications call for a business rule that the database design can't
    8·1 answer
  • Classify computer based on signal
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!