Computers and Technology
Computers and Technology, 30.09.2019 22:30, ronniem

Task 0. create a directory (archive) and cd to archive. copy the attached files here. task 1a. zip command - to create a zip file (hello. zip) containing hello. c and hello (attached here). task 1b. delete hello. c and hello files task 1c. unzip command - to restore hello. c and hello from the zip file (hello. zip). task 2a. tar command - to make a tar file (named hello. tar) which contains hello. c and hello files. task 2b. delete hello. c and hello files task 2c. tar command - to restore hello and hello. c files from hello. tar file task 3a. gzip command - to make a gzip file (named "hello. gz") containing hello and hello. c files. task 3b. delete hello. c and hello files task 3c. restore hello and hello. c files from hello. gz file using gunzip command task 4. compress hello. tar file using gzip command to make hello. tar. gz task 5. compare the file size of these files: hello. zip, hello. tar, hello. gz, and hello. tar. gz task 6. which one is better in compression? state your observation.

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 13:30, baeethtsadia
Asoftware company hired ray, a college graduate to work in their development team. ray is assigned to work in the coding phase of a project. what happens during the coding phase of a software development project? a. the customer receives a working model of the software. b. developers convert the program design into code. c. developers gather requirements directly from the stakeholders. d. testing teams check the product for quality.
Answers: 1
image
Computers and Technology, 22.06.2019 15:30, 1232444553
Which of the following examples has four beats in each measure?
Answers: 2
image
Computers and Technology, 22.06.2019 22:00, mrnotsosmart744
Discuss the ways in which electronic information associated with payments is addressed in terms of security. include encryption, secure sockets layers, and secure electronic transactions in your discussion. are there any other ways that consumers and businesses can keep their payment information secure in an electronic commerce environment? do you feel that your information is safe when conducting electronic business? why or why not?
Answers: 1
image
Computers and Technology, 24.06.2019 07:50, treytonmesser
Write a defining table and then a program that determines if you can sleep in or not. your program should get all its input from your computer’s clock. on all weekdays (monday through friday) that are not holidays, your program should output “get up! ” on all other days (weekends and holidays), your program should output “sleep in.” the three holidays that your program must check for are january 1 (new year’s day), july 4 (u. s. independence day), and december 25 (christmas). you don’t need to include other holidays in your program because most other holidays do not occur on a fixed day each year.
Answers: 1
Do you know the correct answer?
Task 0. create a directory (archive) and cd to archive. copy the attached files here. task 1a. zip c...

Questions in other subjects:

Konu
Mathematics, 05.05.2020 12:31