1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
egoroff_w [7]
2 years ago
7

READ CAREFULLY! There is a difference between moving and copying files.a. Create a directory named . For example, mine would be

look like:/ortiz (this is an example)b. Make a hierarchical directory structure under the directory created in step a above that consists of one directory named directory1 containing three subdirectories named:subdir1asubdir1bsubdir1cb. Create 2 files in subdir1a named:file1afile1bc. Copy these two files (file1a and file1b) into each of the subdirectories (subdir1b and subdir1c).d. Create one more directory (named directory2) under the / directory./
Computers and Technology
1 answer:
OleMash [197]2 years ago
8 0

Answer:

b

Explanation:

You might be interested in
Write a function called min that returns the minimum of the two numbers passed in as parameters.
Kitty [74]

def min(x,y):

   smallest = x

   if y < smallest:

       smallest = y

   return smallest

x = min(2,1)

print("The min is "+str(x))

Although I wouldn't recommend using the name min for a function because min is the name of an existing function. Best of luck.

4 0
3 years ago
True or false? because you have made it a practice to never access the
Flauer [41]

Answer: False

Explanation: Even if the internet service is not connected with the operating system while accessing the database, it is still on risk and can be vulnerable to get attacked. Devices of the system like USB drive can happen to have the malware which creates the risk towards database.

The computer system can get invoked with the virus or other attack while the user connects the internet afterwards when he/she is not accessing the database, these malware get stored in system once they get invoked and corrupt the system and its database even when the internet connection is not present .Thus, the statement given is false.

6 0
2 years ago
Will you benefit from understanding management principles even if you decide not to go into management
satela [25.4K]

Answer:

Yes

Explanation:

It says it.

5 0
3 years ago
Complete the sentences.
Anarel [89]

Answer:

fiances

Explanations it just  is

5 0
2 years ago
In what form do the hexadecimal numbers need to be converted for a computer’s digital circuit to process them? Hexadecimal numbe
artcher [175]

Answer:

people45

Explanation:

3 0
2 years ago
Other questions:
  • __________ ensure that hardware and software produced by different vendors work together.
    14·1 answer
  • What does limited access to a document mean?
    14·2 answers
  • When you select the data range for a pie chart, you should be sure to include the total cell on the worksheet?
    13·1 answer
  • 3) An example of interactive web page is<br>​
    11·1 answer
  • when two pieces of cui or other unclassified information are posted online together or attached together in an email and result
    5·1 answer
  • 120
    14·1 answer
  • Which phrase best describes a scenario in Excel 2016?
    5·2 answers
  • You have to cut a wood stick into pieces. The most affordable company, The Analog Cutting Machinery, Inc. (ACM), charges money a
    10·1 answer
  • Which of the following offers more reliable antivirus protection? Question 43 options: A) antivirus software on user PCs B) anti
    10·1 answer
  • Which of these agents of education empowers the other..........
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!