Answer:
B
Explanation:
An authentication server server tracks who is logging on to the network as well as which services on the network are available to each user. It also does the job of providing a network service that applications can use to authenticate the credentials, that are oftentimes account names and passwords, of their users. Authentication server is also used as the basis for authorization.
Answer:
a. cd into the nested directories/ nested - level - 1 / directory using an absolute path
Explanation:
The directory is a location on the hard disk, which is also called a folder. It contains the files and also contains the other directories called sub directories.
A path to a file is merged with a slash and determines the file or directory in the operating system. An absolute path is the location file or directory from the actual file system
The directory's absolute path starts with a slash, and all slashed in the directory separates the directions.
All directions in the absolute path are written on the left side. The last name in the path may belong to the file, and the pwd command can determine the current directory.
The relative path is the location of the file. It begins with the working directory. An absolute path is unambiguous and working with deeply nested directories.
There are two commands which are used such as
- cd is used for changing directory
- pwd is used for the working directory
We easily navigate the file system with the help of an absolute path.
Answer:
// program in Python.
#read year
i_year=int(input("Please Enter a year:"))
#check leap year
if((i_year % 4 == 0 and i_year % 100 != 0) or (i_year % 400 == 0)):
print("{} is a leap year.".format(i_year))
else:
print("{} is not a leap year.".format(i_year))
Explanation:
Read year from user and assign it to variable "year".If year is completely divisible by 4 and not divisible by 100 or year is completely divisible by 400 then year is leap year otherwise year is not a leap year.
Output:
Please Enter a year:2003
2003 is not a leap year.
I should be skeptical of the credibility of sources that I have during the gathering. Be cautious and make sure that data comes of from trusted specialized sources. Trusted sources can be easily identified for their popularity on certain fields. Determine the purpose of the site and the data it contains.