What command can be issued to confirm which directory you are in at a command line prompt?

Answers

Answer 1

A command which can be issued to confirm the directory which you are in at a command line prompt is: pwd.

What is a directory?

A directory is also referred to as a folder and it can be defined as a document that is typically used for storing and organizing a file on a computer system.

What is a Linux command?

A Linux command can be defined as a software program that is designed and developed to run on the command line, in order to enable an administrator (end user) of a Linux network perform both basic and advanced tasks by only entering a line of text.

In Computer technology, pwd is an abbreviation for print working directory and it is typically used on a Linux computer to determine the full path name of the current directory.

In this context, we can reasonably infer and logically deduce that a command which can be issued to confirm the directory which an end user is in at a command line prompt is pwd.

Read more on Linux pwd command here: https://brainly.com/question/11028644

#SPJ1


Related Questions

an attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack.

Answers

An attack that takes place before the security community and/or software developers become aware of and fix a security vulnerability is called a zero-day attack is a true statement.

What is security?

Security can be defined as the way where a secure environment or the surrounding are being present, this is basically of danger or threat place. It reduces or a lot of insecurities as well as provides safety to the people are an individual group

A zero-day attack is what happens when a hacker successfully exploits a weakness while software engineers can identify a remedy.

Due to their capacity to present as any type of more general software weakness, zero-day bugs can start taking on nearly any shape which may result in great damage and loss.

Learn more about security, here:

https://brainly.com/question/28070333

#SPJ1

The early versions of ____ let web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.

Answers

The early versions of HTML let web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.

What was the  early versions of  HTML?

The first type  of HTML was said to be written by a man known to be called Tim Berners-Lee and this was done in the year in 1993.

After then, there have been a lot of other different versions of HTML. Therefore, note that The early versions of HTML let web page designers create text-based electronic documents with headings, title bar titles, bullets, lines, and ordered lists.

Learn more about HTML from

https://brainly.com/question/12215194

#SPJ1

in a rack setup, a device called a kvm allows multiple consoles to connect to a single device on the rack.

Answers

in a rack setup, a device called a kvm allows multiple consoles to connect to a single device on the rack is a False statement.

What is a rack and what is its purpose?

A rack is known to be a term that is used in computing as well as in an IT (information technology).

The term is known to be one that connote the act that is acting as a supporting framework that tends to holds hardware modules.

In the above context, racks are seen as a kind of  contain servers, hard disk drives as well as  other forms of computing equipment.

The Racks are known to be tools that make it possible to place in a lot of equipment in a little physical footprint without  the need for shelving.

Therefore, in a rack setup, a device called a kvm allows multiple consoles to connect to a single device on the rack is a False statement.

Learn more about consoles  from

https://brainly.com/question/27031409

#SPJ1

in a rack setup, a device called a kvm allows multiple consoles to connect to a single device on the rack. True or False. .

in which domain of a typical it infrastructure is the first layer of defense for a layered security strategy?

Answers

The domain of a typical IT infrastructure that is the first layer of defense for a layered security strategy is the firewall.

What is a Firewall?

This refers to the set of protection that determines what external network traffic(internet) should or should not be allowed to pass the internal network.

Hence, we can see that The domain of a typical IT infrastructure that is the first layer of defense for a layered security strategy is the firewall and this is because it protects and filters incoming network.

This firewall helps to act as the first layer of defense for a layered security strategy as it allows or prevents network access.

Read more about firewalls here:

https://brainly.com/question/13693641

#SPJ1

the is a collection of classes and other code that can be used along with a programming language such as c

Answers

.Net framework is a collection of classes and other code that can be used along with a programming language such as c

Microsoft's Net Framework is a software development platform for creating and running Windows applications. The .Net framework is made up of libraries, programming languages and developer tools that can be used to create web and desktop applications. It is also used in the development of games, web services and websites.

.Net framework also supports a number of programming languages, including Visual Basic, C and C#. As a result, developers can select and choose the languages to create the required application.

To learn more about .Net Framework: brainly.com/question/14501179

#SPJ4

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. _________________________

Answers

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat is a true statement.

What is compromised system in networking?

A network or system that is known to be compromised is one when  there has been a breach in regards to confidentiality, as well as integrity or presence of its infrastructure or components in any type.

Therefore, based on the above, one can say that Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat is a true statement.

Learn more about compromised system from

https://brainly.com/question/28482553

#SPJ1

Indirect attacks originate from a compromised system or resource that is malfunctioning or working under the control of a threat. true or false.

Linux a user typed in the command pwd and saw the output: /home/jim/sales/pending. how could that user navigate to the /home/jim directory?

Answers

Linux a user typed in the command pwd and saw the output: /home/jim/sales/pending. the way in which that user can navigate to the /home/jim directory? is cd ../..

What is a Directory?

This refers to the special type of file that has only the information needed to access files.

Hence, we can see that Linux a user typed in the command pwd and saw the output: /home/jim/sales/pending. the way in which that user can navigate to the /home/jim directory? is cd ../..

This would take him back to the root directory which is home in the Jim directory and he can start viewing the files in their parent-child order.

Read more about directories here:

https://brainly.com/question/28391587

#SPJ1

A/an _______________ may be required for a position such as information technology consultant, information systems manager, or information security analyst.

Answers

A certification may be required for a position such as information technology consultant, information systems manager, or information security analyst.

What is certification?

Certification can be defined as a process which describes the formal recognition that is given to a graduate student for the successful completion of an academic programme, course of study such as:

FinanceEducationInformation technology consultant.Information systems manager.Information security analyst.Engineering

In this context, we can reasonably infer and logically deduce that a certification may be required for a position such as information technology consultant, information systems manager, or information security analyst.

Read more on certification here: https://brainly.com/question/13412233

#SPJ1

Which of the following is a responsibility of the hardware? (1 point)
O processing
O runtime prioritization
O memory allocation
O managing hardware

Answers

The option that is a responsibility of the hardware is option a: processing​.

What is a hardware in a computer?

Hardware is known to be a term that is seen as  the computer's tangible parts or its delivery systems.

It is one that helps in processing as well as saves or store and run the written instructions that is known to be given  by the software.

Therefore, based on the above, The option that is a responsibility of the hardware is option a: processing​.

Learn more about hardware  from

https://brainly.com/question/24370161

#SPJ1

write the header file (.h file) of a class acc2 containing: a data member named sum of type int. a constructor accepting no parameters. a function named getsum that accepts no parameters and returns an int.

Answers

// acc2.h

// c++ class header for acc2
class acc2
{
public:

// getsum()
int getsum()
{
return sum_;
}

// Default constructor
acc2()
{
sum_ = 0;
}

private:
int sum_;
}

What were two weaknesses of the First New Deal?

A. It failed to end massive unemployment.
B. It created a huge national deficit.
C. It created tension within labor unions.
D. It failed to properly regulate the banks.
E. It caused people to distrust the banks.

Answers

Answer:B. It created a huge national deficit.

Explanation:

B.The New Deal failed because Roosevelt created uncertainty through experimentation, protectionism, regulation, and raising taxes.

The New Deal failed because the NRA, by fixing prices, damaged American business. Folsom explains that the traditional free market system, where businesses compete and innovate to sell products of varying price and quality to choosy customers was overthrown

D. It failed to properly regulate the banks.

.The next day, Roosevelt declared a four-day bank holiday to stop people from withdrawing their money from shaky banks. On March 9, Congress passed Roosevelt’s Emergency Banking Act, which reorganized the banks and closed the ones that were insolvent.

The Great Depression: Causes and Early Events: Mastery Test

-

Hope this helps :)

Which property of a plaintext password is most effective at defeating a brute-force attack?

Answers

The property of a plaintext password is most effective at defeating a brute-force attack is The length of the password.

Which property of a plaintext password is used for defeating a brute-force attack?

The length of the password is known to be very vital in this type of an attack.

Note that when the password is one that do not have any kind of complexity that is of it is just simple dictionary words, it is one that can make a system to  be still be vulnerable but if it is seen as a long password, the system may still be in a vulnerable state but when the output space is small it makes it hard and difficult.

Therefore, The property of a plaintext password is most effective at defeating a brute-force attack is The length of the password.

Learn more about brute-force attack from

https://brainly.com/question/17277433

#SPJ1

an application is running with a multiple level queue and a variable time quantum per queue. the current incoming job needs 80 ms to run to completion.

Answers

Based on the above, the answers are:

a. Number of times Job interrupted = 4

b. Job Finish at Which Queue = 5th

c. Time Spends on each Queue

Queue 1 = 5ms

Queue 2 = 10ms

Queue 3 = 20ms

Queue 4  = 40ms

Queue 5  = 80ms

What is the Queue about?

Based on the Data given:

Total Time Required to complete the job = 80ms

Time Quantum of First Queue = 5ms

We need to Find

a. No. of times Job interrupted ?

b. Job Finish at Which Queue ?

c. Time Spends on each Queue?

Therefore,

Since Queue 1 = 5ms

all of the Queue has double time Quantum than former one so thatl

Queue 2 = 2x 5ms = 10ms

Queue 3 = 2x 10ms = 20ms

Queue 4 = 2x 20ms = 40ms

Queue 5 = 2x 40ms = 80ms

a. The System will interrupt 4 times as there are five queue in the system.

b. As mentioned in Question that 80ms will it take to complete the job so, This task will be completed in 5th Queue.

Therefore, Based on the above, the answers are:

a. Number of times Job interrupted = 4

b. Job Finish at Which Queue = 5th

c. Time Spends on each Queue

Queue 1 = 5ms

Queue 2 = 10ms

Queue 3 = 20ms

Queue 4  = 40ms

Queue 5  = 80ms

Learn more about Queue from

https://brainly.com/question/14975970

#SPJ1

See full question below

Assume that the system has a multiple level queue with a variable time quantum per queue, and that the incoming job needs 80 ms to run to completion. If the first queue has a time quantum of 5 ms and each queue thereafter has a time quantum that is twice as large as the previous one, how many times will the job be interrupted and on which queue will it finish its execution? Calculate how much time in ms that it spends in each queue.

kate decides to download an extension to her favorite browser to quickly store links on her spreadsheet software. while downloading the software, she ignores the opt-out check box that allows the extension to download a search toolbar.

Answers

By ignoring the opt-out check box that allows the extension to download a search toolbar, the error which has occurred here is that: d. Kate has installed a potentially unwanted program (PUP).

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task (function) and proffer solutions to a particular problem.

What is a potentially unwanted program (PUP)?

A potentially unwanted program (PUP) can be defined as a piece of software that's bundled into download packages and may be unwanted by the end user because it offers no benefits or may pose high risk.

In this scenario, we can reasonably infer and logically deduce that the error which has occurred here is that Kate has installed a potentially unwanted program (PUP) because she ignored the opt-out check box which then allowed the extension to download a search toolbar.

Read more on potentially unwanted program here: https://brainly.com/question/25091456

#SPJ1

Complete Question:

Kate decides to download an extension to her favorite browser to quickly store links on her spreadsheet software. While downloading the software, she ignores the opt-out check box that allows the extension to download a search toolbar.

What has occurred here?

a. Kate has installed an injection.

b. Kate has installed a backdoor.

c. Kate has installed a Trojan.

d. Kate has installed a potentially unwanted program (PUP).

What will be stored in the variable age after this code snippet executes? public static void main(string[] args) { int age = 16; age ; age--; age ; }

Answers

The age that will be stored in the variable age after this code snippet executes is 17.

What is code snippet?

Code snippets are known to be little blocks of codes that are known to be reusable and they are also said to be codes that can be placed inside of a code file through the use of a right-click menu (context menu) command or  one can be able to make use of a combination of hotkeys.

Note that they are the ones that has the commonly used code blocks and in the case above, the age is push forward by one.

Therefore, The age that will be stored in the variable age after this code snippet executes is 17.

Learn more about code snippet from

https://brainly.com/question/24080680

#SPJ1

What will be stored in the variable age after this code snippet executes?

public static void main(String[] args)

{

int age = 16;

age++;

age--;

age++;

}

your colleague has 15 years of log files full of performance data. the data needs to be sorted, but the file siz

Answers

Given that your colleague has 15 years of log files full of performance data. the data needs to be sorted, using a merge sort to divide the data into smaller chunks, sort them recursively, then merge results to produce the final sorted file with all data is given below:

The Merge Sort

import java.util.*;

public class Main {

public static void merge(String data)

{

String arr[]=data.split(";");

if(arr[0]==null||arr[1]==null) {

System.out.println(data);

return ;

}

String sorted_result=""; // to store the sorted alhanumeric character separated by comma

String pair=""; // to store the comparision pair

int i=0,j=0;

while(i<arr[0].length()&&j<arr[1].length())

{

char a=arr[0].charAt(i);

char b=arr[1].charAt(j);

if(a<b) // if the character of first array is smaller than second

{

sorted_result+=a+",";

pair+="("+a+","+b+") ";

i=i+2;

}

else

{

sorted_result+=b+",";

pair+="("+b+","+a+") ";

j=j+2;

}

}

while(i<arr[0].length())

{

char a=arr[0].charAt(i);

sorted_result+=a+",";

i+=2;

}

while(j<arr[0].length())

{

char b=arr[0].charAt(j);

sorted_result+=b+",";

j=j+2;

}

sorted_result=sorted_result.substring(0, sorted_result.length()-1);

System.out.println(sorted_result);

System.out.println(pair);

}

public static void main(String[] args) {

String input1="1,4,7,8;2,3,5,6";

merge(input1);

System.out.println();

String input2="H,L,M,P,P,R,S,b,d,i,n,o,o,p,s;1,5,5,6,7,8,C,U,V,V,W,f,h,r,s";

merge(input2);

System.out.println();

String input3="B,E,E,F,J,N,O,P,U,W,D;G,J,L,N,R,S,V,X,Y";

merge(input3);

}

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

A file path is a complete address that describes the exact location of a file. true false

Answers

It is true that a complete address that specifies a file's precise location is known as a file path. That question is related to file system.

A file system stores and arranges files on some type of storage device—typically one or more hard drives—in a way that makes it simple to access and retrieve them. The majority of current file systems store the files in a tree-like (or hierarchical) form.

One or more root nodes can be found at the top of the tree. There are directories and files beneath the root node (folders in Microsoft Windows). Each directory has the ability to hold files and subdirectories, which in turn have the ability to hold files and subdirectories, and so on, potentially indefinitely.

The sample directory tree with a single root node is depicted in the accompanying diagram. Multiple root nodes are supported by Microsoft Windows. Each root node corresponds to a volume, like C: or D: The root node that the Solaris OS supports is identified by the slash (/).

Learn more about file system https://brainly.com/question/11994563

#SPJ4

A computer can be a flexible and powerful tool by using what type of software?

Answers

A computer can be a flexible and powerful tool by using an application software.

What is an application software?

Application software is known to be a type of computer program that is known to often carry out a particular task such as personal, educational, as well as  business function.

Note that all application is set up so that they can be able to assist end-users in carrying out a lot of tasks that are linked to productivity, creativity, etc.

Therefore, A computer can be a flexible and powerful tool by using an application software.

Learn more about application software from

https://brainly.com/question/26954052

#SPJ1

What is the foreign exploitation of copyrights via a license from the original publisher called?

Answers

The foreign exploitation of copyrights via a license from the original publisher called Sub publishing.

What is Sub Publishing?

The term sub-publisher is  known to be a term that connote when a company is said to be engaged by any rights holder to be able to license as well as administer its works in a given region or a given territory.

A good example, an American publisher can act ot engage the services of a sub-publisher in Britain to handle its works in that country.

Therefore, The foreign exploitation of copyrights via a license from the original publisher called Subpublishing.

Learn more about copyrights  from

https://brainly.com/question/357686

#SPJ1

two routers, r1 and r2, connect using an ethernet over mpls service. the service provides point-to-point service between these two routers only, as a layer 2 ethernet service. which of the following are the most likely to be true about this wan? (choose two answers.)

Answers

a. R1 will connect to a physical Ethernet link, with the other end of the cable connected to R2.

b. R1 will connect to a physical Ethernet link, with the other end of the cable connected to a device at the WAN service provider point of presence.

c. R1 will forward data link frames to R2 using an HDLC header/trailer.

d. R1 will forward data link frames to R2 using an Ethernet header/trailer.

B (R1 will link to a physical Ethernet link, with the other end of the cable attached to a device at the WAN service provider point of presence.) and D (R1 will transmit Ethernet header/trailer-encoded data link frames to R2 for transmission).

Each router connects to an SP device in an SP facility known as a point of presence using a physical Ethernet link in the physical installation (POP).

Each customer's device is not connected through an Ethernet link. Both routers employ the same Ethernet standard header and trailer used on LANs from a data link standpoint; HDLC is irrelevant on these Ethernet WAN links.

Learn more on routers here:

https://brainly.com/question/9490122

#SPJ4

freddy wants to take up a few platform-specific courses for his new job. which courses can he take? to be able to perform for programming languages specific to a certain platform, freddy can take courses such as and .

Answers

Freddy can enrol in classes in HTML5 and CSS3 to learn how to function for programming languages particular to a particular platform.

The term "CSS 3" refers to Cascading Style Sheets revision 3, which is a style sheet programming language created for describing and enhancing the presentation of a webpage (document) expressed in a markup language like:

XMLHTML

What is it HTML 5?

The term HTML 5, which stands for hypertext markup language revision 5, can be referred to as a standard computer language used for creating and presenting websites or webpages.

Freddy can attend classes in HTML5 and CSS3 to learn how to use platform-specific programming languages to do a number of things.

Learn more about programming languages:

https://brainly.com/question/27905377

#SPJ4

What comparison operator is used to test whether an expression does not equal another expression?

Answers

A comparison operator which is used to test whether an expression does not equal another expression is: !=

What is programming?

Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.

In Computer technology, a comparison operator can be defined as a type of binary operator that is used for comparing the data values in a field (expression) to either the data values in another field (expression) or a constant.

In conclusion, a comparison operator which can be used to test whether an expression does not equal another expression is the != operator.

Read more on comparison operator here: https://brainly.com/question/2647100

#SPJ1

Why is John Von Neumann a remarkable name in the history of the computer?​

Answers

Answer:

John Von Neumann is one of the most famous people in the history of computers because of the fact that he came up with the concept of speedy computers with data, "the storage program technique". He introduced idea to help out with high speed digital data

One of his important contributions in this field was the development of a logical design for computers that paid attention to such concerns as data storage and the processing of instructions. This design, called “von Neumann architecture,” became the basic concept of most computers

Explanation:

Answer: John Von Neumann is one of the most famous people in the history of computers because of the fact that he came up with the concept of speedy computers with data. "the storage program technique".

Explanation:

which of the following should go in the place of /* missing line */ to get this input from the user and store it in the variable favoritemeal?

Answers

favoriteMeal = scan.nextLine(); should be used to get an input from the user and store it in the variable favoriteMeal.

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

This ultimately implies that, a variable refers to a named location that is used to store data in the memory of a computer. Also, it is helpful to think of variables as a container which holds data that can be changed in the future.

In Computer technology, there are two main methods for passing variables to functions and these include the following:

Pass-by-value.Pass-by-reference.

Based on the given lines of code, favoriteMeal = scan.nextLine(); should be used to get an input from the user and store it in the variable favoriteMeal.

Read more on variable here: brainly.com/question/12978415

#SPJ1

Complete Question:

The following code is to be used to get the favorite meal from the user.

Scanner scan = new Scanner(System.in);

String favoriteMeal;

System.out.println("Enter favorite meal");

/ missing line /

Which of the following should go in the place of /* missing line */ to get this input from the user and store it in the variable favoriteMeal?

the name of the windows utility (part of the operating system that works as a tool to help you complete tasks) that allows you locate and see the contents of folders on your computer

Answers

Answer:

FILE EXPORER

Explanation:

the task is to ask the user for three numbers and find the average. which pseudocode gives you the comment outline for the task? ask the user for three numbers add the numbers divide by 3 print the average ask the user for three numbers, , add the numbers, , divide by 3, , print the average

Answers

The task is to ask the user for three numbers and find the average.

The pseudocode that gives you the comment outline for the task is ask the user for three numbers, , add the numbers, , divide by 3, , print the average

What is a Pseudocode?

This refers to the plain language that makes a description of the steps in an algorithm

Hence, we can see that The task is to ask the user for three numbers and find the average.

The pseudocode that gives you the comment outline for the task is ask the user for three numbers, , add the numbers, , divide by 3, , print the average

This helps to add the numbers and then find the average and then print the result as given above.

A simple algorithm for this would be:

Step 1: Enter three numbers

Step 2: Add the numbers

Step 3: Divide by 3

Step 4: Find the average

Step 5: End

Read more about pseudocodes here:

https://brainly.com/question/24953880

#SPJ1

Why are magnetic devices an effective means of representing the binary values?

Answers

Magnetic storage uses the two types of magnetic polarities to represent the binary information consisting of zeros and ones. 

A) Identify and describe your computer or laptop’s hardware, software, and operating system. B) Describe the installation process for printers and scanners. Identify possible malfunctions relating to this installation process. C) Research and describe how you would ensure computer and Internet safety. Describe how you would use ergonomics to minimize the detrimental effects of excess computer usage on your body.

Answers

My computer hardware is Lenovo Ideapad3; to install a printer we must connect it and follow the steps of the automatic software; protection on the pc is guaranteed by using an antivirus; injuries are prevented by taking active breaks and using ergonomic tools.

What is the hardware, software and operating system of my computer?

To know the specific data of our computer we must follow the following steps (Windows):

Hit the WIN+R keys on your computer to open RunA window will open at the bottom left of your monitorType Dxdiag in that windowPress Enter or OK to run it

The first thing that Windows will do is ask us if we want to go ahead and tell us that our computer may be connected to the Internet. Afterwards, it will take a few seconds to scan everything on it. After those seconds, we will be shown a window with the diagnostic tool in which we find a lot of information organized by tabs. In my case the hardware of my computer is:

Lenovo Ideapad 3.

How to install printers and scanners?

To install printers and scanners to our computer we can use different methods, one of them is to insert the CD that comes with our printer; the other process is to connect the device via cable or bluetooth and follow the steps in the automatic installation.

In general, this process is easy and usually has no errors. However, when it has errors and does not work correctly, we must uninstall and reinstall the software.

How to ensure safety when using the computer?

To prevent the security of our computer from being circumvented by a hacker, we must have an updated antivirus and periodically scan our computer to avoid malicious programs or files that harm our security.

How to avoid damage from overuse?

To avoid diseases, injuries or damage to our body due to excessive use of the computer, we must carry out the following actions:

Use filter lenses to protect our eyes.Use an ergonomic mouse and keyboard.Take active breaks during our work on the computer.Have a correct position while using our computer.

Learn more about computers in: https://brainly.com/question/21080395

#SPJ1

which statement, executed once at the start of the program, enables a program to generate pseudo-random numbers with variable newseed as the seed?

Answers

Srand(time(0)) executed once at the start of the program, enables a program to generate pseudo-random numbers with variable newseed as the seed.

We evaluate each choice separately to do this.

(a) srand()

The use of srand() in the example above is improper because it needs an argument to be used (2)

(b) srand(time(0))

Because time(0) allows srand() to seed to the current time, the sentence above is acceptable and will always produce unique pseudo random numbers.

(c) Srand (100)

The aforementioned is a legitimate use of srand(), however because srand() has a seed size of only 100, rand() will produce the same set random integers.

(d) time(srand())

Additionally, the aforementioned use of srand is improper ().

Learn more about pseudo-random:

https://brainly.com/question/13854906

#SPJ4

operating systems are the programs that allow you to edit documents, make presentations and create spreadsheets.

Answers

An operating systems are the programs that allow you to edit documents, make presentations and create spreadsheets is a false statement.

What are operating systems?

An operating system is known to be one of the most vital software that runs on a computer and it is one that helps you  manages the computer's memory as well as processes.

Note therefore, An operating systems are the programs that allow you to edit documents, make presentations and create spreadsheets is a false statement because the Word processing software does that work.

Learn more about operating systems  from

https://brainly.com/question/22811693

#SPJ1

operating systems are the programs that allow you to edit documents, make presentations and create spreadsheets.True or false

Other Questions
vidal-gonzalez, i., vidal-gonzalez, b., rauch, s.l., quirk, g.j., 2006. microstimulation reveals opposing influences of prelimbic and infra-limbic cortex on the expression of conditioned fear. learn. mem. 13, 728733. find the value of x -7 when x=20. Which of the following is a form of government based on popular sovereignty?a. monarchyb. autocracyc. republicd. oligarchy the american anthropological association (aaa) has established a code of ethics that requires that anthropologists be guided by a principle that has been compared to a doctor's hippocratic oath, which essentially says, Assume that the risk free rate increases, but the market risk premium remains constant. What impact would this have on the cost of debt Convert 13000 milligrams into pounds. Round your answer to the nearest hundredth What disease processes contribute to chronic heart failure? select all that apply. Precise operational definitions of unobservable psychological constructs would have the least relevance in the research programs of? Petrolyn motor oil is a combination of natural oil and synthetic oil. It contains 6 liters of natural oil for every 5 liters of synthetic oil. In order to make 671 liters of Petrolyn oil, how many liters of natural oil are needed? A patient reports a recent onset of pain in the calf when climbing stairs. the pain is relieved when the patient sits and rests for about two minutes. which condition would the nurse suspect? what are two ways the Constitution places checks on the power ofthe federal government? Which quantity is held constant when working with boyles, charless, and gay-lussacs laws? volume moles pressure temperature Ask the question that corresponds to each answer. Use est-ce que/qu' and inversion for each item.Modle: Nous habitons sur le campus.Est-ce que vous habitez sur le campus?Habitez-vous sur le campus?1. Il mange au resto U.2. J'oublie les examens.3. Franois dteste les maths.4. Nous adorons voyager.5. Les cours ne commencent pas demain.6. Les tudiantes arrivent rn classe. What should cms do to ensure that all patients that need a face-to-face encounter receive one? seventeenth-century maryland stood out for its system of absolute rule, but also for its practice of religious toleration. In the preamble, the phrase "establish justice, insure domestic tranquility" means to improve the government system and structure. to create a system of laws for internal peace. to identify the seat of power in the government. to install this government system for the nation. What exactly arethe immoralists? Are they bad, or "immoral" people? which of the following mawhich of the following are benefits of an internship? select all that apply.ight be part of a job description for an entry-level project manager role? use vectors to prove that the line joining the midpoints of two sides of a triangle is parallel to the third side and half its length. What was one outcome for laissez-faire economic policiesA.) More rights for workersB.) Low prices for cnsumersC.) May laws about businessD.) Pollution of air and water