Imagine that you saw a Usenet posting with something particularly funny in it and saved the posting to a file. How would you incorporate this file into your own buffer? What if you wanted to use only a couple of paragraphs from the posting? How would you add > to the beginning of each included line?

What will be an ideal response?


To read a file into the current buffer, move the cursor to where you want to
add the file and give the command CONTROL-X i (insert-file).
There are several ways to add only a few paragraphs from a file: You can
read the entire file and delete the parts you do not want. Alternatively, you
can read the file into its own buffer with CONTROL-X CONTROL-F , kill the part you
want, go back to the original buffer with CONTROL-X b (switch to buffer), and
yank the killed text with CONTROL-Y.
To place a greater-than sign followed by a SPACE at the beginning of each line
of the new text, place the cursor at the beginning of the new text, give the
command META-x query-replace-regexp ^RETURN >SPACE RETURN, and respond with
SPACE to each prompt until you reach the end of the new text; then respond
with RETURN.

Computer Science & Information Technology

You might also like to view...

You should have read permission for the /etc/passwd file. To answer the fol- lowing questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system.

a. Which character is used to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users are on the local system? d. How many different login shells are in use on your system? (Hint: Look at the last field.) e. The second field of /etc/passwd stores user passwords in encoded form. If the password field contains an x, your system uses shadow passwords and stores the encoded passwords elsewhere. Does your system use shadow passwords?

Computer Science & Information Technology

Which of the following is true about the Microsoft iSCSI service?

A. you can only use the DNS name as an IQN identifier B. by default, the service does not run automatically C. to disconnect from an iSCSI target, you must shut down the initiator D. the witness disk must be at least 100 MB

Computer Science & Information Technology

____________________ is a computer networking philosophy and a related set of protocols that are together used to evaluate the trustworthiness of a client wishing to join a network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Explain why an IT department and a user support group may disagree about the responsibility for the development of end-user applications.

What will be an ideal response?

Computer Science & Information Technology