Which switch should be used in the DIR command to view files in all
directories ?
1) /P
2) /W
3) /S
4) /L

1 Answer

Answer :

3) /S

Related questions

Description : Which switch should be used in the DIR command to view files in all directories ? 1 /P 2 /W 3 /S 4 /L

Last Answer : 3 /S

Description : Which of the following commands is used to list contents of directories? A. ls B. lp C. dir D. tar E. None of the above

Last Answer : A. ls

Description : Write Unix command for following: i)create a folder OSY ii) create a file FIRST in OSY folder iii) List/display all files and directories. iv) Write command to clear the screen

Last Answer : i) create a folder OSY: $mkdir OSY ii)create a file FIRST in OSY folder: $cd OSY $cat>FIRST or $ touch FIRST iii) List/display all files and directories: $ls iv) to clear screen: $clear

Description : What is the switch that is used to make sure that the COPY command copied files correctly 1) /A 2) /C 3) /S 4) /V

Last Answer : 4) /V

Description : What is the switch that is used to make sure that the COPY command copied files correctly 1 /A 2 /C 3 /S 4 /V

Last Answer : 4 /V

Description : What MS-DOS command is used to create a subdirectory ? (1) DIR/MK (2) MKDIR (3) CHDIR (4) RMDIR

Last Answer : MKDIR

Description : Which one of the following is an MS-DOS external command ? (1) DIR (2) COPY (3) FORMAT (4) PROMPT 

Last Answer : FORMAT

Description : Which of the following commands displays names of files in sorted order? 1) DIR/N 2) DIR/SO 3) DIR/AN 4) DIR/AH

Last Answer : 3) DIR/AN

Description : Which of the following commands displays names of files in sorted order? 1 DIR/N 2 DIR/SO 3 DIR/AN 4 DIR/AH

Last Answer : 3 DIR/AN

Description : Data (information) is stored in computer as ________: a) Directories b) Files c) Floppies d) Matter e) None of The Above

Last Answer : b) Files

Description : Data (information) is stored in computers as- 1) Files 2) Directories 3) Floppies 4) Matter

Last Answer : 1) Files

Description : Linux command to create nested directories (a directory inside a directory) -Web-Development

Last Answer : answer:

Description : Does archiving files and directories into ZIP or RAR enhance defragmentation?

Last Answer : No because writing and deleting files is what causes fragmentation. Especially writing such large files to an already fragmented disk. Just get Diskeeper and let it run in the background. It's a very ... have to do any tricks, or remember everything. My disks are never fragmented when I check them.

Description : Digital Forensics entails _____. A. Accessing the system's directories viewing mode and navigating through the various systems files and folders B. Undeleting and recovering lost ... identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Last Answer : D. The identification, preservation, recovery, restoration and presentation of digital evidence from systems and devices

Description : Which of the following information about the UNIX file system is not correct? (A) Super block contains the number of i-nodes, the number of disk blocks, and the start of the list of free disk blocks. (B ... Each i-node is 256-bytes long. (D) All the files and directories are stored in data blocks. 

Last Answer : (C) Each i-node is 256-bytes long.

Description : Where can you purchase Astoria city directories by R.L.Polk Co. Publishers?

Last Answer : Here is the link for the book or you can get it on CD or use the online version.

Description : Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3? A. chmod u+x emp[l-3] B. chmod 777 emp* C. chmod u+r ??? emp D. chmod 222 emp? E. None of the above

Last Answer : A. chmod u+x emp[l-3]

Description : Why can't I get online w/ Ubuntu and D-Link DIR-655 router?

Last Answer : You don’t want WPA Enterprise, you want WPA Personal. The password it’s asking for is the same as the key. The two are used interchangeably in this case.

Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack

Last Answer : d. SQL Injection attack

Description : Which command is not used to switch off the computer ? (1) Turn off (2) Log off (3) Shut Down (4) Hibernate

Last Answer : Hibernate

Description : Which of the following statement is not correct with reference to cron daemon in UNIX O.S? (A) The cron daemon is the standard tool for running commands on a predetermined schedule. (B) It starts ... command lines and the times at which they invoked. (D) Crontab for individual users are not stored.

Last Answer : (D) Crontab for individual users are not stored.

Description : In SQL, which command(s) is(are) used to issue multiple CREATE TABLE, CREATE VIEW, and GRANT statements in a single transaction? A. CREATE PACKAGE B. CREATE SCHEMA C. CREATE CLUSTER D. All of theabove E. None of the above;

Last Answer : CREATE SCHEMA

Description : How would you cope? You just spent $100K defending your estate from California's DIR and you lost.

Last Answer : It’s called get the F out of California. Seriously the state can’t keep doing things like this and expect anyone with any sense to stay. I’m sorry they are stealing from you

Description : D-link dir-280 status light not on... why?

Last Answer : answer:Is anything lighting up on the router? I not, yes dead Or maybe the transformer/wall-wart.

Last Answer : The full form of DIR - Defense of India Rules Esq- Esquire

Description : Assertion :- According to Hugo de Vries , it is mutation which causes speciation and hence called it saltation. Reason :- Mutations are random and dir

Last Answer : Assertion :- According to Hugo de Vries , it is mutation which causes speciation and hence called it ... . D. If both Assertion & Reason are false.

Description : Lowari Pass connects: A. Kaghan Valley with Chilas B. Kalam with Gilgit C. GoramChashma with Nooristan D. Dir with Chitral

Last Answer : ANSWER: D

Description : Lowari Pass connects: A. Kaghan Valley with Chilas B. Kalam with Gilgit C. GoramChashma with Nooristan 77 D. Dir with Chitral

Last Answer : ANSWER: D

Description : Kanishka ruled about AD 128-151, Buddhism flourished and thousands of monasteries and stupas were built in the Peshawar Plains and nearby: A. Swat B. Dir C. Kohistan 54 D. Chitral

Last Answer : ANSWER: A

Description : You want to lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain, you will press: a) Window + M b) Window + L c) Window + Q d) None of These

Last Answer : b) Window + L

Description : Are telephone directories(books) becoming obsolete, just like home telephones?

Last Answer : I got a phone book delivered to me, and it went straight to the recycling bin lol. I have internet on my phone, I’ll use one in case the internet completely shuts down.

Description : Mac developers: any ideas of how to merge two directories?

Last Answer : Never mind. I made a silly mistake. opendiff foo/ bar/ -merge /bar totally works.

Description : Do link directories give you dofollow backlinks?

Last Answer : If you are paying a link directory to add links to your website to help your ranking they must add dofollow links. They can't have you pay for a nofollow link on your site. There are many sites that ... in the end, this is one of the best ways to get ranked higher in Google and other search engines.

Description : Electronic Information Directories?

Last Answer : As you consider all of the different child services that are available, one thing that you must think about is what types of directories will be the most helpful. These directories can ... comforting since discovering that your contact information is wrong during a crisis can be a nightmare.

Description : Updating writes to cache data andalsoto___ a. Directories b. Memory c. Registers d. Folders

Last Answer : a. Directories

Description : Which of the following statements is not true about disk-arm scheduling algorithms ? (A) SSTF (shortest seek time first) algorithm increases performance of FCFS. (B) The number of requests for disk ... arm movements. (D) SCAN and C-SCAN algorithms are less likely to have a starvation problem.

Last Answer : (B) The number of requests for disk service are not influenced by file allocation method.

Description : Why did the rmdir command fail's that a directory bar exists. The command rmdir bar fails with the message that the directory is not empty. On running ls bar no files are displayed?

Last Answer : This could mean that the directory named bar has hidden contents. Use ls -a bar to show all contents of bar.

Description : The …………… command customizes the kernel configuration and generates the files needed to compile and link the kernel. A. ping B. ifconfig C. make config D. finger

Last Answer : C. make config

Description : What command will you use to navigate through ASM files?

Last Answer : asmcmd

Description : Which command is used to concatenate all files beginning with the string 'emp' and followed by a non-numeric characters? A. cat emp[!0-9] B. more [emp][!0-9] C. cat emp[x-z]

Last Answer : A. cat emp[!0-9]

Description : Which of the following files will displayed by this command cat *ch* A. patch B. catch C. .ch D. All of the above E. None of the above

Last Answer : D. All of the above

Description : Which command is used to copy all files having the string chap and any two characters after that to the progs directory? A. cp chap?? progs B. cp chap* progs C. cp chap[12] /progs/*.*

Last Answer : A. cp chap?? progs

Description : The Unix command: $ vi file1 file2 (A) Edits file1 and stores the contents of file1 in file2 (B) Both files i.e. file1 and file2 can be edited using ex' command to travel between files (C) Both ... using the mv' command to move between the files (D) Edits file1 first, saves it and the edits file2

Last Answer : (B) Both files i.e. file1 and file2 can be edited using ‘ex’ command to travel between files

Description : In the circuit diagram shown in Figure E=18V , L=2H, `R_(1)=3Omega , R_(2)=6Omega`. Switch S is closed at t=0 Match the following:

Last Answer : In the circuit diagram shown in Figure E=18V , L=2H, `R_(1)=3Omega , R_(2)=6Omega`. Switch S is closed at t=0 Match the following:

Description : In the figure shown `C_(1)=1F, C_(2)=2F and L=5H`. Initially `C_(1)` is charged 50V and `C_(2)` to 10V. Switch S is closed at time t=D. Suppose at som

Last Answer : In the figure shown `C_(1)=1F, C_(2)=2F and L=5H`. Initially `C_(1)` is charged 50V and `C_(2)` to 10V. ... will A. 10 J B. 15 J C. 25 J D. 40 J

Description : In the figure shown `C_(1)=1F, C_(2)=2F and L=5H`. Initially `C_(1)` is charged 50V and `C_(2)` to 10V. Switch S is closed at time t=D. Suppose at som

Last Answer : In the figure shown `C_(1)=1F, C_(2)=2F and L=5H`. Initially `C_(1)` is charged 50V and `C_(2)` to 10V. ... (2) A` C. `20sqrt(3) A` D. `12sqrt(6) A`

Description : In the figure shown `C_(1)=1F, C_(2)=2F and L=5H`. Initially `C_(1)` is charged 50V and `C_(2)` to 10V. Switch S is closed at time t=D. Suppose at som

Last Answer : In the figure shown `C_(1)=1F, C_(2)=2F and L=5H`. Initially `C_(1)` is charged 50V and `C_(2)` to 10V. ... ` B. `15sqrt(2) A` C. `10 A` D. `20 A`

Description : Rehearse Timings command is present on ………………. tab. (a) Animations (b) Review (c) Slide Show (d) View -Technology

Last Answer : c) Rehearse Timings command is present on Slide Show tab.

Description : In three dimensional view the molecule of tRNA is (a) L-shaped (b) S-shaped (c) Y-shaped (d) E-shaped.

Last Answer : (b) S-shaped

Description : In three dimensional view the molecule of tRNA is (a) L-shaped (b) S-shaped (c) Y-shaped (d) E-shaped.

Last Answer : (a) L-shaped