Which of the following is not one of the three main types of Linux commands??

A. ?binary programs
B. ?shell scripts
C. ?shell functions
D. ?device calls


Answer: D

Computer Science & Information Technology

You might also like to view...

Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.

Indicate whether the statement is true or false

Computer Science & Information Technology

What can an attacker use that gives them access to a computer program or service that circumvents normal security protections?

A. adware B. backdoor C. bot herder D. botnet

Computer Science & Information Technology

A(n) ______ bus connects the processor to cache.

A. system B. memory C. expansion D. backside

Computer Science & Information Technology

____ are the characteristics of an object.

A. Instances B. Attributes C. Behaviors D. Methods

Computer Science & Information Technology