1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
makvit [3.9K]
3 years ago
12

What will be the results from running the following code?

Computers and Technology
1 answer:
kari74 [83]3 years ago
4 0

Answer:syntax error

Explanation:

Correct on edg 2021

You might be interested in
A user is reporting to you that they are unable to run a script named script1 within their home directory. The user has ownershi
lianna [129]

The correct scripts are:

chmod 765 script1

chmod u+x script1

A cοmmand is an instructiοn givеn by a usеr tеlling a cοmputеr tο dο sοmеthing, such a run a singlе prοgram οr a grοup οf linkеd prοgrams. Cοmmands arе gеnеrally issuеd by typing thеm in at thе cοmmand linе (i.е., thе all-tеxt display mοdе) and thеn prеssing thе ЕNTЕR kеy, which passеs thеm tο thе shеll.

In Unix-likе οpеrating systеms, chmοd is thе cοmmand and systеm call which may changе thе accеss pеrmissiοns tο filе systеm οbjеcts. It may alsο altеr spеcial mοdе flags. Thе rеquеst is filtеrеd by thе umask. Thе namе is an abbrеviatiοn οf changе mοdе.

8 0
4 years ago
How does Shakespeare immediately introduce Tybalt as a menacing character?
Scilla [17]

The correct answer to this open question is the following.

Although there are no options attached we can say the following.

William Shakespeare immediately introduces Tybalt as a menacing character in the first moments of the play "Romeo and Juliet" because Tybalt is an aggressive man who does not support the idea of peace or get peaceful agreements to solve problems. Tybalt does not like the Montague people.

“The tragedy of Romeo and Juliet” was written by the English writer William Shakespeare approximately in 1590 and is considered to be a play in a poetic form. It refers to the story of two lovers that belonged to opposite families in dispute. Their love is forbidden. Eventually, both lovers die and that is the reason for their families to reconcile.

5 0
3 years ago
Find at least three software programs for each of the two technologies listed below.
lakkis [162]

Answer:

Android Studio, FileZila

Explanation:

Android studio provides you with all tools you need to build a mobile application l.

FileZila is an FTP controller, you cam DELETE , SEND, RECIEVE data from it.

7 0
3 years ago
Read 2 more answers
You're setting up some VMs to test an application you're considering making available to employees of the small company you work
IgorLugansk [536]

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

6 0
3 years ago
Read 2 more answers
When you want to print a page from the World Wide Web, select the print command in the _____. A-status bar B-command toolbar C-d
TEA [102]

Answer:

b is your answer

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which element in Access is an ideal data source?
    12·2 answers
  • A___________ is a person who can give information to potential employers about your character and your abilities. Employer emplo
    7·1 answer
  • The central device on a network that provides a common connection point for nodes on that network is called the
    8·1 answer
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    15·1 answer
  • What is institutional advertising focused on promoting?
    8·1 answer
  • What did Francis Ford Coppola and George Lucas create?
    10·1 answer
  • A/an ________is a device used to protect computers against surges and spikes in power.
    14·1 answer
  • Based upon the contents of the BOOKS table, which line of the following SQL statement contains an error?
    13·1 answer
  • Mathematics and computer science share many concepts.
    5·2 answers
  • HELP ME ON THIS PLEASE ILL GIVE BRAINLY!!!! If U GET IT RIGHT !!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!