The command ____ is used to find a specified string of characters in a file.
A. cp
B. mv
C. grep
D. ls
Answer: C
Computer Science & Information Technology
You might also like to view...
What are the semantics of UDP?
What will be an ideal response?
Computer Science & Information Technology
Which centralized authentication method is the latest and strongest version of a set of authentication protocols developed by Cisco Systems?
A. TACACS+ B. RADIUS C. Kerberos D. MD5
Computer Science & Information Technology
Double hashing solves collisions by ____.
A. rehashing the address B. joining to hashes generated with two different functions C. multiplying the hash value by 2 D. dividing the hash value by 2
Computer Science & Information Technology
You have 20 laptops in a room they all need to connect wirelessly to the network. What is the best choice?
A. Switch B. Router C. Access point D. Hub
Computer Science & Information Technology