1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Black_prince [1.1K]
3 years ago
15

In dos operating system ,write a command to delete the directory as well as the files of the directory ''world'' on drive E.

Computers and Technology
1 answer:
Sergeeva-Olga [200]3 years ago
3 0

Answer:

deltree /y E:\world

Note that the /y option simply tells it to go ahead and answer yes to any confirmation prompts that might occur.  Not necessarily part of the desired answer.

Explanation:

The deltree command tells the system to recursively delete a directory and its contents.

You might be interested in
How does the use of the computer impact businesses
Andre45 [30]
Computers can help organize the workplace and it can also help communications between work members. This is the vague explanation of how it impacts businesses. However, different businesses have different uses for computers and other technologies.
7 0
3 years ago
Which of the following is NOT an example of soft skill?
Klio2033 [76]
I think it’s A. Leadership
7 0
3 years ago
Read 2 more answers
What is a man-in-the-middle attack​
VMariaS [17]

Answer: An attack where the attackers will interrupt a data transfer happening between parties and in which they will pretend to be the legitimate parties.

Explanation: For example think about two people writing letters to each other back and forth. However you, the attacker can intercept the letters and effectively change the message/contents of the letter going to the other person. This is probably not the best explanation, but simply put a man-in-the-middle attack is when an attacker interupts a transfer and pretends to be the legitimate source.

4 0
2 years ago
Read 2 more answers
How is a network address of 192.168.6.0 and a subnet mask of 255.255.254.0 written in cidr?
ZanzabumX [31]
It can be written with

192.168.6.0/23

255.255.0.0 means  /16 which is class b subnet mask so as 254 is in the third octet which means /23 so you can write it as /23.
6 0
3 years ago
WHO WANTS TO PLAY AMONG US
Elza [17]

Answer:

Explanation:

ME

8 0
3 years ago
Read 2 more answers
Other questions:
  • Java languageThe cost to ship a package is a flat fee of 75 cents plus 25 cents per pound.1. Declare a constant named CENTS_PER_
    5·2 answers
  • Which word in brackets is most opposite to the word in capitals? PROSCRIBE (allow, stifle, promote, verify)​
    14·2 answers
  • What type of network is capable of delivering voice, video streams, text, and graphics between many different types of devices o
    15·1 answer
  • Which of the following means to find and fix errors in code?Which of the following means to find and fix errors in code?
    5·1 answer
  • Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and
    5·1 answer
  • Describe the importance of human interaction in a computing system.
    14·2 answers
  • Hey does anyone know the name of that movie where like this teenage girl is chilling at her house then there is an outbreak of s
    6·1 answer
  • How does the autosum command calculate data? Need help ASAP​
    5·1 answer
  • Look at (c), is it accurate? ​
    9·2 answers
  • Please help me.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!