Answer: C)report the status of individual computer users
Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.
Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)
Answer:
sed '/march/{d;}' birthdays.txt > result
.txt
Explanation:
sed syntax is basically:
<em>sed '/expression/{command;command;...;}' inputfile > outputfile</em>
- First, for the expression part, we use /march/ to match all lines containing that string.
- Then for the command part, we only use {d} command to delete every matching line found.
- The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.
- Finally "> result
.txt" makes the script output to be saved into a file named result.txt
Answer:
The nature of computers and code, what they can and cannot do.
How computer hardware works: chips, cpu, memory, disk.
Necessary jargon: bits, bytes, megabytes, gigabytes.
How software works: what is a program, what is "running"
How digital images work.
Computer code: loops and logic.
Big ideas: abstraction, logic, bugs.
Practice!
And a good keyboard I recommend mechanical key boards
But the best way to improving your WPM is definitely practice one way you can practice is playing typeracer it’s pretty fun way
Hope this helps!
Brainliest is much appreciated!