1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
2 years ago
12

Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in t

ext between two text files File1.txt and File2.txt and save the result in a file named result.txt (b) Change the permissions of the file remote_driver.c such that the owner has the permissions to read, write and execute and anybody other than the owner can only read the file but cannot write or execute. (c) Search for the string ir_signal in the file /home/grad/remote_driver.c and print on the terminal the number of instances of the given string in the file /home/grad/remote_driver.c (d) Reboot the system after 5 minutes. (e) Display the list of processes currently being run by the user harvey. (f) Print 3 copies of a file named my_driver.c from a printer that has a name HPLaserJet4300. (g) Put the last 40 lines of the file driver_log.log into a new file final_fault.txt.
Computers and Technology
1 answer:
Luda [366]2 years ago
8 0
You have to add the integer
You might be interested in
Write 3 3 advantage and disadvantage of computer​
navik [9.2K]

Answer:

Advantages: computers don't make human error

It can be used for communication

Ease of access

Disadvantages: computers can be a distraction

Potential loss of privacy

It can limit learning and create a dependency

8 0
3 years ago
The __________ certification program has added a number of concentrations that can demonstrate advanced knowledge beyond the bas
Sophie [7]

Answer:

CISSP

Explanation:

The CIDDP concentrations are an extension and development on the knowledge and credentials of the standard CISS certification that improves employability and career advancement

The CISSP concentrations includes

Information System Security Architecture Professional which can be known as ISSAP

Information System Security Engineering Professional which can be known as ISSEP

Information System Security Management Professional which can be known as ISSMP.

4 0
3 years ago
EBay is an example of an online company that has been faced with numerous security issues. For example, imagine you purchase a d
Bond [772]

Answer: d)Phishing

Explanation: Phishing is the activity that is used by the attackers or unauthorized parties to steal confidential information of individuals through emails, messages or calls.This activity is considered as cyber-crime as the unauthorized source present themselves as the legal and actual party to gain private information such as credit card details, personal details , etc.

The example mentioned in the question about eBay's security issue is also related with phishing  where the fraud mails are sent to the users to gain or steal their personal information.

Other options are incorrect because insider is a threat that happens in the organization or business field regarding the organizational data,dumpster diving is reviving data to execute an attack on operating system and social engineering is gaining personal information from an individual through manipulation .Thus, the correct option is option(d).

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

7 0
3 years ago
A diminished triad can be indicated by
natka813 [3]

A  diminished triad can be indicated by A lower-case Roman numeral and °.

<h3>How do you Know a diminished triad?</h3>

In any diminished triad, the middle and top two notes of the chord are known to be the flattened and shown by the symbol "o" or "dim."

Therefore, A  diminished triad can be indicated by A lower-case Roman numeral and °.

See options from below

A diminished triad can be indicated by:

A) A lower-case Roman numeral and °.

B) A lower-case Roman numeral and +.

C) An upper-case Roman number and °.

Learn more about triad from

brainly.com/question/4951751

#SPJ11

3 0
2 years ago
At what two layers of the osi model are lan and wan protocols likely to differ??
Anuta_ua [19.1K]
A LAN is connecting two or more computers to form a cable network between them.
<span>A WAN is connecting two or more computers over a broad area to form a cable network between them.</span>
5 0
3 years ago
Other questions:
  • Query: [mcdonalds Austin] Viewport: Fresh User Location: within Houston, TX Result Returned: McDonalds location in a neighboring
    7·1 answer
  • Few people will care if you use their image in a photograph without obtaining their consent. True False
    10·1 answer
  • Using the _____ model brings sellers and buyers together on the web and collects commissions on transactions between these parti
    5·1 answer
  • Can someone please help me with the three questions please?
    6·1 answer
  • How to delete account on this
    7·2 answers
  • Given a integer, convert to String, using String Builder class. No error checking needed on input integer, However do read in th
    11·1 answer
  • Given an array arr of type int , along withtwo int variables i and j , write some code thatswaps the values of arr[i] and arr[j]
    6·1 answer
  • Describe at least two other companies that are direct or indirect competitors to your company. Explain how you will differentiat
    15·1 answer
  • Even if you cannot afford it you should donate at least 5 of your earnings to charity true or false
    8·1 answer
  • Why is experience in their own factory setting
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!