The command ____ is used to find a specified string of characters in a file.

A. cp
B. mv
C. grep
D. ls


Answer: C

Computer Science & Information Technology

You might also like to view...

What are the semantics of UDP?

What will be an ideal response?

Computer Science & Information Technology

Which centralized authentication method is the latest and strongest version of a set of authentication protocols developed by Cisco Systems?

A. TACACS+ B. RADIUS C. Kerberos D. MD5

Computer Science & Information Technology

Double hashing solves collisions by ____.

A. rehashing the address B. joining to hashes generated with two different functions C. multiplying the hash value by 2 D. dividing the hash value by 2

Computer Science & Information Technology

You have 20 laptops in a room they all need to connect wirelessly to the network. What is the best choice?

A. Switch B. Router C. Access point D. Hub

Computer Science & Information Technology