The Bourne shell is

a: super set of the Korn shell
b: superset of the C shell
c: just like the C shell
d: the standard shell
e: none of the above


d: the standard shell

Computer Science & Information Technology

You might also like to view...

To create a link that moves to an anchor on the same page, you code the href attribute as # followed by the name of the __________________ attribute for the element that the link should go to.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Using ____ computing, you can take advantage of Microsoft Office Online apps to do your work in a virtual environment.

A. distribution B. virtual C. cloud D. dynamic

Computer Science & Information Technology

TheaddEventListenermethod is commonly used to access the element specified by a CSS selector.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is IT disaster recovery?

A. IT disaster recovery recovers IT employees in ccase of a disaster. B. IT disaster recovery is superset of business continuity. C. IT disaster recovery looks specifically at the technical aspects of how a company can get IT back into operation using backup facilities. D. IT disaster recovery looks specifically at the business aspects of how a company can get IT back into operation using backup facilities.

Computer Science & Information Technology