Shell scripts can get user input by using

A. the read command
B. the input command


A. the read command

Computer Science & Information Technology

You might also like to view...

If a loop contains a test condition that can never be met, it is called a(n) __________ loop.

Fill in the blank(s) with correct word

Computer Science & Information Technology

An O(n) algorithm is referred to as having a _______ run time.

a. constant b. linear c. quadratic d. negative

Computer Science & Information Technology

Management information systems (MIS) provide ________ reports, which show conditions that are unusual or need attention from users of the system.

A. detail B. summary C. exception D. expert

Computer Science & Information Technology

Matt, the security administrator, notices a spike in the number of SQL injection attacks against a web server connected to a backend SQL database. Which of the following practices should be used to prevent an application from passing these attacks on to the database?

A. OS hardening B. Application patch management C. Error and exception handling D. Input validation

Computer Science & Information Technology