Questions LLC
Login
or
Sign Up
Ask a New Question
Computer Science
Page 5
Questions (2,568)
Which of the following PowerShell commands will tell you which process on your system is using the most CPU resources?
3 answers
asked by
????
279 views
. A computer password consists of thirteen characters. Replications are allowed.How many different passwords are possible if
3 answers
asked by
William Langham
1,672 views
Question 1. Consider the following Assembly program segment given below:
ORG 0x0400 Address 0400h MOV SP, 0460H MOV AL, 1 MOV BX,
4 answers
asked anonymously
82 views
Bot, please give a detailed explanation on the meaning of data model
2 answers
asked by
Freezer
71 views
Bot, please give a detailed explanation on the meaning of data model
2 answers
asked by
Freezer
135 views
Which of these will correctly create a list?
my_list = () for i in range (1, 50): my_list.append(i) my_list = [] for range (1,
1 answer
asked anonymously
88 views
Digital quantities
2 answers
asked anonymously
37 views
Accessing and controlling the filing system in team building.
2 answers
asked by
Samke
64 views
what is the stem for the data entry 478
2 answers
asked anonymously
41 views
Mention the basic techniques of data processing
1 answer
asked anonymously
68 views
State four main component of computer
1 answer
asked anonymously
102 views
explain binary coded decimal
1 answer
asked by
Shalom Mbaa
51 views
Name the two commands that moves text from one point to another
7 answers
asked anonymously
53 views
Rom bios is a small set of instructions that tells the computer all of the following except ____.
1 answer
asked anonymously
85 views
the purpose of a flowchart is similar to the purpose of pseudocode.
True False
1 answer
asked by
addreian
74 views
4.
Dwayne wants a variable called “name” to appear in the output box and does not want a space after it. Which of these
1 answer
asked by
addreian
131 views
Design the Relational Schema for the E-R diagram that you have drawn for Question 1. The relations must be at least in 3NF.
3 answers
asked by
Ruhi
167 views
List down the advantages and disadvantages of embedded system?
1 answer
asked by
EYASURULE
108 views
What is embedded system?
1 answer
asked by
EYASURULE
60 views
List down the applications of computer vision
1 answer
asked by
EYASURULE
61 views
Note: You will need to use VerilUOC_Desktop to answer this question. Please, complete the module "VerilUOC_Desktop tools",
1 answer
asked by
Shubhrato
121 views
Mention two differences between ram and rom
1 answer
asked by
Freezer
91 views
State the full meaning of the following acronyms as applicable to operating system (i) GUI (ii) CLI (iii) FAT (iv) NTFS.
1 answer
asked by
Freezer
81 views
Use the output redirection to create a file named "date.txt" containing the manual page for the date command. The “date.txt”
3 answers
asked anonymously
108 views
Grep command in "Text.txt" that contain a character “a” not followed by a character “i” and end with any numeric
1 answer
asked by
Anonymous
87 views
What is the line to set permissions (using octal numbers) on the "text.txt" file to:
user: read, write, and execute group: read,
1 answer
asked by
Anonymous
116 views
Set the permissions (using octal numbers) on the "text.txt" file to be:
user: read, write, and execute group: read, write others:
1 answer
asked by
Anonymous
87 views
Write a SED command that would delete lines from the "text.txt" file that contain any two identical numbers located next to each
1 answer
asked by
Anonymous
102 views
how to display the absolute path of home directory?
1 answer
asked by
Anonymous
66 views
how to display the home directory?
1 answer
asked by
Anonymous
71 views
...d
63 answers
asked anonymously
102 views
14. The owner of the process can lower and increase the priority of the running process they own.
a) True b) False
1 answer
asked by
Anonymous
76 views
13. The directory contains information about processes.
a) /snap b) /etc c) /var d) /proc e) /process f) /opt
1 answer
asked by
Anonymous
67 views
12. Sed stands for simple editor.
a) True b) False
1 answer
asked by
Anonymous
58 views
9. Awk operations are:
a) Scan a file line by line b) Split each line into fields c) Compare input line/fields to pattern d) None
1 answer
asked by
Anonymous
84 views
8. The ______ Command can be used to change the priority of a running process.
a) Alter b) Priority c) Renice d) Nice e) Run f)
1 answer
asked by
Anonymous
100 views
4. When you run a program or execute a Linux command you have created a process.
a) True b) False
1 answer
asked by
Anonymous
76 views
3. The following sed command can be used to clean up files by removing empty lines from the content of the Sed_File.txt file:
a)
1 answer
asked by
Anonymous
109 views
2. The following sed command removes the first 10 lines from a file:
a) Sed ‘1.10d’ < filename b) Sed ‘/1,10/d’ <
1 answer
asked by
Anonymous
85 views
29. The REGEX asterisks (*) character has exactly the same meaning as the Globbing (wildcard) asterisks (*) character.
a) True b)
3 answers
asked by
Anonymous
91 views
27. All of the following can be used to identify a system account except ______?
a) Id between 1 and 499 b) Absence of a home
1 answer
asked by
Anonymous
88 views
24. The following environment variable stores the exit status of the last executed command:
a) $$ b) #* c) $# d) $?
1 answer
asked by
Anoymous
82 views
20. The following grep command will search the f.txt file for lines containing any number of spaces (at least one space must be
1 answer
asked by
Anonymous
102 views
19. The /etc/passwd file is an example of a flat file database.
a) True b) False
1 answer
asked by
Anonymous
69 views
17. The following environment variable is responsible for the appearance of the shell command prompt.
a) PROMPT b) PATH c) PS1 d)
1 answer
asked by
Anonymous
94 views
16. When you enclose a command between two _______, the shell replaces the command with the output of the command (Command
1 answer
asked by
Anonymous
109 views
14. The following grep command will search the f.txt file for all lines containing any stand-alone three digit number.
a) Grep
1 answer
asked by
Anonymous
95 views
12. All bash variables are integers by default.
a) True b) False
1 answer
asked by
Anonymous
70 views
8. The following command allows users to execute commands as root users:
a) Root b) Asroot c) Su d) Sudo
1 answer
asked by
Anonymous
79 views
7. A question mark (?) is a REGEX character that is used to describe any single character.
a) True b) False
1 answer
asked by
Anonymous
79 views
Pages
1
2
3
4
5
6
7
8
9
10
Parent Categories (21)
Academic Degrees
Academic Subjects
Careers
College Majors
College/University
Curriculum
Degree Programs
Education
History and Technology
Information Technology
Programming
Science
Science and Technology
Science/Technology
Study Materials
Subject
Subjects
Technology
Technology and Computers
Technology and Computing
Writing