1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kati45 [8]
3 years ago
5

The true or false questions.

Computers and Technology
1 answer:
DIA [1.3K]3 years ago
7 0

Answer:

true

Explanation:

The command:

find -empty -type f -exec rm { } \;

carries out the following steps.

1) Finds all the empty files in the current directory and its subdirectories.

2) For each of the identified files, it executes the command specified as the parameter to exec option,namely, rm <filename>.

So effectively it removes all empty files in the directory tree starting at the current directory.  

You might be interested in
Question 11. Assume that you want to copy and paste some range with values and number formats. Which radio button you should sel
Tcecarenko [31]

Answer:

i had the same qustion

Explanation:

8 0
3 years ago
Read 2 more answers
Draw the final structure that will house the electronic system​
Natasha_Volkova [10]

Answer:

1. TECHNOLOGY GRADE 9 TERM 3. In this chapter, you will revise the work you did on electrical systems and control

Explanation:Circuits can be found in just about every electronic device you ... An electric circuit is in many ways similar to your circulatory system

4 0
3 years ago
Within a word processing program, predesigned files that have layout and some page elements already completed are called
dexar [7]

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

4 0
3 years ago
How do you change the username on here?
never [62]

Answer:

I don't think you can. You can try to make an email that has the name you want and use that.

Explanation:

6 0
3 years ago
Edhesive Intro to CS Code Practice 1.8
Nonamiya [84]

<em>Questions:</em>

<em>CS Code Practice 1.8  Question 1:</em>

<em>Write a code that accepts the user's age as an input, then print their age in 10 years.</em>

<em></em>

<em>CS Code Practice 1.8  Question 2:</em>

<em>Write a code that accepts a whole number as an input, subtracts 5 and print the answer</em>

<em></em>

Answer:

Question 1:

currentage = int(input("Enter your age: "))

print("Your age in 10 years is "+str(currentage + 10))

Question 2:

userinput = int(input("Enter a whole number: "))

print(str(userinput)+" - "+str(5)+" = "+str(userinput - 5))

Explanation:

There are two questions in this category and I don't know which of them you need; So, I answered both.

Question 1:

This line prompts user for age

currentage = int(input("Enter your age: "))

This line adds 10 to user input and prints the result

print("Your age in 10 years is "+str(currentage + 10))

Question 2:

This line prompts user for a whole number

userinput = int(input("Enter a whole number: "))

This line subtracts 5 from the whole number and prints the result

print(str(userinput)+" - "+str(5)+" = "+str(userinput - 5))

6 0
3 years ago
Other questions:
  • Define lan wan &amp; man
    14·1 answer
  • You have heard that the Linux distribution your are going to install to run a new application runs best on a RISC architecture.
    15·1 answer
  • A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its
    5·1 answer
  • What makes for a good algorithm compatibility complexity humor correctness efficiency?
    11·1 answer
  • When choosing a new computer to buy, you need to be aware of what operating it uses.
    12·1 answer
  • You cannot advance slides during the slide show by pressing the PAGE DOWN key
    12·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    7·1 answer
  • Difference between copy command and cut command
    13·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
  • An IT company has a HealthCare application with data security requirements such that the encryption key must be stored in a cust
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!