1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
2 years ago
6

Question 2 of 10

Computers and Technology
1 answer:
inn [45]2 years ago
8 0

Answer:

b

Explanation:

I really don't but I hope its correct

You might be interested in
Give a command that will create a file named listing.dat, in your current (commandsAsst) directory, containing a list of all the
ss7ja [257]

Answer:

Following are the command to this question:

"ls -a ~/UnixCourse/fileAsst > listing.dat"

Explanation:

The above-given code will create a file, that is "listing.dat", and this file will be created in your current directory, which will include the list of all files in the file-asst directory.

In this, Is command is used that uses the directory that is "UnixCourse/fileAsst" and inside this, it will create the "dat" file that is "listing".

8 0
3 years ago
An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f
klio [65]

Answer:

The main problem with such a tool would be resource usage

Explanation:

The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.

8 0
3 years ago
What do you think that private information like passwords, PIN numbers, will be guarded or shared with the public? Why?​
Salsk061 [2.6K]

Answer:

Explanation:

These will be shared with the public because websites like haveibeenpwned share what data leaks that your password has appeared on. It is inevitable that these hacks will continue to occur as long as security can be breached.

6 0
2 years ago
Which part of project management takes deadlines into consideration?
Bess [88]

Answer:

resources because it is the resources that has the second authority over a business

4 0
3 years ago
Read 2 more answers
For angular how can we set up th edatabse.
lesya [120]
You can not communicate directly between Angular and MySQL. You'll need to build a back-end Web service that calls MySql using php or node. Angular can communicate with this back-end Web service via http.
8 0
3 years ago
Other questions:
  • In cell F29, use an IF function to display the correct Shipping Charge, based on the amount of the Discounted Total. If the Disc
    9·1 answer
  • Who are some of my emails not all deleting on my android i have to use my laptop to see them to delete them?
    12·2 answers
  • The feedforward part of the conversation should do all of the following except __________.a.identify the toneb.introduce the pur
    11·1 answer
  • Help me please and thanks
    8·1 answer
  • URLs are directions that browsers follow in order to find specific web page files. What is the first part of the URL that is the
    14·1 answer
  • A _____ defines what must take place, not how it will be accomplished.​
    12·1 answer
  • What is the purpose of networking with other businesses?
    10·1 answer
  • List at least five smaller behaviours you could break the complex behaviour ""brushing my teeth"" into.
    6·1 answer
  • Please describe the role of games in modern society!
    5·2 answers
  • A _ is the acknowledgment of a potential noncomformity, or an opinion regarding an issue that is not covered by a standard
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!