1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
koban [17]
3 years ago
8

Which command could you use to change to the /usr directory using a relative pathname?

Computers and Technology
1 answer:
swat323 years ago
6 0

Answer:

To change directories, use the cd command. This command by itself will always return you to your home directory; moving to any other directory requires a pathname. You can use absolute or relative pathnames.

Explanation:

I hope it's help

You might be interested in
Adding Calculator Write a program that simulates an adding machine. Input to the program will be integers, submitted one per lin
Marysya12 [62]

Answer:

This is really hard. I tried doing this problem but of was a real pain. I honestly can't help. I tried. sorry mate.

7 0
3 years ago
good information is characterized by certain properties. List and explain these characteristics of good information​
Gelneren [198K]

Answer:

here is your ans

Explanation:

Characteristics of good quality information can be defined as an acronym ACCURATE. These characteristics are interrelated; focus on one automatically leads to focus on other.

Accurate

Information should be fair and free from bias. It should not have any arithmetical and grammatical errors. Information comes directly or in written form likely to be more reliable than it comes from indirectly (from hands to hands) or verbally which can be later retracted.

Complete

Accuracy of information is just not enough. It should also be complete which means facts and figures should not be missing or concealed. Telling the truth but not wholly is of no use.

Cost-beneficial

Information should be analysed for its benefits against the cost of obtaining it. It business context, it is not worthwhile to spend money on information that even cannot recover its costs leading to loss each time that information is obtained. In other contexts, such as hospitals it would be useful to get information even it has no financial benefits due to the nature of the business and expectations of society from it.

User-targeted

Information should be communicated in the style, format, detail and complexity which address the needs of users of the information. Example senior managers need brief reports which enable them to understand the position and performance of the business at a glance, while operational managers need detailed information which enable them to make day to day decisions.

Relevant

Information should be communicated to the right person. It means person which has some control over decisions expected to come out from obtaining the information.

Authoritative

Information should come from reliable source. It depends on qualifications and experience and past performance of the person communicating the information.

Timely

Information should be communicated in time so that receiver of the information has enough time to decide appropriate actions based on the information received. Information which communicates details of the past events earlier in time is of less importance than recently issued information like newspapers. What is timely information depends on situation to situation. Selection of appropriate channel of communication is key skill to achieve.

Easy to Use

Information should be understandable to the users. Style, sentence structure and jargons should be used keeping the receiver in mind. If report is targeted to new-comer in the field, then it should explain technical jargons used in the report.

4 0
3 years ago
Can the teacher provide your feedback through Google Classroom?
ella [17]

Answer:

Yes

Explanation:

The teacher always answers all queries if she/he is online and the question u ask is understandable

4 0
3 years ago
Read 2 more answers
Is there an air flow through the house? if so, does the air flow in the window and out the chimney, or in the chimney and out th
soldier1979 [14.2K]

The correct explanation is option B. The pressure is reduced at the chimney due to the movement of the wind above. Thus, the air will flow in the window and out the chimney.

<h3>What is the main purpose of chimney?</h3>

The primary work of the chimney is to show the way that the smoke need to take away from the stove and also out of the house.

Hence, The correct explanation is option B. The pressure is reduced at the chimney due to the movement of the wind above. Thus, the air will flow in the window and out the chimney.

Learn more about chimney from

brainly.com/question/24792291

#SPJ1

See full question below

Is there an air flow through the house? If so, does the air flow in the window and out the chimney, or in the chimney and out the window? Choose the correct explanations.

A. The pressure is increased at the chimney due to the movement of the wind above. Thus, the air will flow in the chimney and out the window.

B. The pressure is reduced at the chimney due to the movement of the wind above. Thus, the air will flow in the window and out the chimney.

C. The pressure is increased at the chimney due to the movement of the wind above. Thus, the air will flow in the window and out the chimney.

D. The pressure is reduced at the chimney due to the movement of the wind above. Thus, the air will flow in the chimney and out the window.

E. The pressures at the chimney and the window are the same. Thus, the air will not flow.

5 0
2 years ago
A company wants to implement a wireless network with the following requirements:
jarptica [38.1K]

Answer:

PEAP is the correct answer to the given question .

Explanation:

The  PEAP are implemented to meet the demands because it is very much identical to the EAP-TTLS design also it includes the server-side PKI authentication .

  • The main objective of  PEAP is to establish the protected TLS tunnel for protecting the authentication process, as well as a server-side encryption authentication.
  • The PEAP  is also used for validating the application it validating her process with the help of the TLS Tunnel encryption between the user and the verification.
  • All the other options are not suitable for the  to meet the requirements of the design that's why these are incorrect option .
3 0
3 years ago
Other questions:
  • Question 1
    9·1 answer
  • The most commonly used software in the school systems that include word processor, spreadsheet, database management system, and
    6·1 answer
  • I have six nuts and six bolts. Exactly one nut goes with each bolt. The nuts are all different sizes, but it’s hard to compare t
    12·1 answer
  • Write an expression that executes the loop body as long as the user enters a non-negative number. Note: If the submitted code ha
    14·1 answer
  • Are goals that<br> have concrete criteria for measuring<br> progress toward their attainment.
    5·1 answer
  • The following equations estimate the calories burned when exercising (source): Men: Calories = ( (Age x 0.2017) — (Weight x 0.09
    11·1 answer
  • What application can be used to set windows 8 to boot into safe mode while still in windows?
    15·1 answer
  • Given the three thread states: running, runnable (i.e., ready), and blocked (i.e., waiting), state which of the six possible thr
    13·1 answer
  • Introduction or background of corporal punishment in schools
    15·1 answer
  • Hadley made a plan that after downloading the Eclipse IDE, she would disable her security program, extract and install Eclipse,
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!