What is the command to list the top 10 files that use the most disk space in linux?

Answers

Answer 1

Type du -a /dir/ | sort -n -r | head -n 20. du will calculate the file space used. The sort will sort out the output of a du command.

Why is Linux used? Linux is an open source operating system (OS). An operating system, which is a piece of software, is directly in charge of managing the hardware and resources of a system, including the CPU, memory, and storage. By sitting between applications and hardware, the operating system (OS) creates connections between all of your software and the operational physical resources. Many of the gadgets you likely own, such as Android smartphones, tablets, and Chromebooks, as well as digital storage, cameras, wearable technology, personal video recorders, and more, all support Linux.  Your automobile has Linux running on the inside. Linux is an open-source alternative to Windows OS, which is a for-profit operating system.

To learn more about Linux, refer to:

https://brainly.com/question/25480553

#SPJ4


Related Questions

____ increase network performance by reducing the number of frames transmitted to the rest of the network

Answers

Switches increase network performance by reducing the number of frames transmitted to the rest of the network.

Switches are an integral part of networks assigned the role to serve as the means to share information among different devices.

Switches perform their function by supervising and controlling the flow of data to the intended devices thus preventing the undesired flow of data to all the devices in a network which improves the performance of the network. Switches can also play a role to prevent errors as it checks the data prior to transmitting the data forward.

Switches determine the devices to which the data packets are to be sent by using their media access control (MAC) address. All hardware units connected to a system have their unique MAC address. Switches identify the MAC address of the device that sends the frames and then interpret the MAC address of the target device thus preventing the frames to pass towards the rest of the network.

To learn more about switches, click here:

https://brainly.com/question/13484447

#SPJ4

An instructor is explaining the roles of the fda and dea in setting standards for drug control. what area does the fda control?

Answers

The FDA and DEA is responsible for the approval and removal of products on the market.

The Food and Drug Administration (FDA) is responsible for ensuring the safety of foods, tobacco products, dietary supplements, prescription and over-the-counter drugs, vaccines, biopharmaceuticals, blood transfusions, medical devices, electromagnetic radiation emitting devices (ERED), cosmetics, animal foods & feed, and veterinary products.

The U.S. Department of Justice's Drug Enforcement Administration (DEA) is a federal law enforcement organization entrusted with preventing drug distribution and trafficking within the country. The DEA is solely in charge of organizing and carrying out all domestic and international American drug investigations.

Learn more about DEA https://brainly.com/question/980288

#SPJ4

What is the term for the psychology, reasoning, and history behind a character's reactions in certain situations?

Answers

There are a lot of factors in behavioral neuroscience. For starters, there are social-cultural influences and biological and psychological influences. You can operate on a social script ( an action made off of previously perceived scenarios)
Most teenagers operate off of social-cultural psychology, primarily because of propaganda on TV, family traditions, etc.
Psychological factors like cognition could serve as a trait for situations.
Biological traits like testosterone, bipolar disorder, etc. It can affect these situations.

b. What is another name of Mark-I?​

Answers

Answer:

IBM Automatic Sequence Controlled Calculator (ASCC

When using ioc creation software like mandiant's ioc creator, what are some considerations?

Answers

Inversion of control (Ioc) is a programming technique used in software engineering. In contrast to conventional control flow, Ioc inverts the control flow.

What is ioc creation software?A free editor for Indicators of Compromise is called IOC Editor (IOCs). IOCs are XML documents that assist incident responders in gathering a variety of information regarding threats, such as the characteristics of malicious files, registry update characteristics, artifacts in memory, etc. According to the software design principle known as "inversion of control," if control over an application's flow is moved to another area of the application, the program will benefit in terms of pluggability, testability, usability, and loose coupling. A design technique known as inversion of control (Ioc) enables classes to be loosely connected, making them simpler to test and manage. Ioc stands for the transfer of control (from the main application to a container or framework) of objects and their dependents.

To learn more about ioc creation software, refer to:

https://brainly.com/question/25347439

#SPJ4

Question # 5 Multiple Choice What benefit do internal networked e-mail systems provide over Internet-based systems? Responses They allow files to be shared by sending attachments. They allow files to be shared by sending attachments. They enable the transmission of videos. They enable the transmission of videos. They provide increased security. They provide increased security. They allow e-mail to be sent to coworkers. They allow e-mail to be sent to coworkers.

Answers

The benefit that  internal networked e-mail systems provide over Internet-based systems is that they provides increased security.

What is  Networked email system?

The term networking emails are emails you send to forge new connections or strengthen ones you already have. There are numerous scenarios that can be covered in networking emails.

You might be emailing someone you only know online who is a complete stranger. Additionally, networking computers can help you increase communication so that employees, suppliers, and consumers can more easily exchange information.

Therefore,  The benefit that  internal networked e-mail systems provide over Internet-based systems is that they provides increased security.

Learn more about Internet-based system from

https://brainly.com/question/2780939
#SPJ1

Almost half of the people in the world are on social media, and predictions Indicate that this number will only continue to increase. What conclusion can you draw from this?

a. social media is passing phase in most cultures

b. social media will eventually replace all other forms of communication

c. social media will need to develop more kinds of platforms to be popular

d. social media platforms will become an increasingly important part of communication ​

Answers

Answer:

social media will eventually replace all other forms of communication

Which of the following is technically NOT a programming language?


HTML


Java


JavaScript


C++

Answers

Answer:

HTML ⠀⠀⠀ ‌⠀⠀⠀ ‌⠀⠀⠀ ‌⠀⠀⠀ ‌

Answer:

A) HTML is not a programming language

Explanation:

Trust

Which protocol is used by a device to ensure that an apipa address is not already in use on the network?

Answers

ARP protocol is used by a device to ensure that an APIPA address is not already in use on the network.

A local-area network's Address Resolution Protocol (ARP) links a media access control (MAC) address, commonly known as a fixed physical machine address, to an ever-changing Internet Protocol (IP) address (LAN).

One of the most significant protocols of the network layer in the OSI model is the Address Resolution Protocol (ARP), which assists in determining the MAC (Media Access Control) address of the system given the IP address of the system. The primary function of the ARP is to convert the 32-bit IP address (for IPv4) to the 48-bit address, i.e., the MAC address.

Protocol for Address Resolution (ARP) A layer 2 protocol called the Address Resolution Protocol is used to translate MAC addresses into IP addresses.

Learn more about network:

https://brainly.com/question/26875099

#SPJ4

6) Which of the following an OPERATING SYSTEM? a) Window 7 b) excel c) PowerPoint d) Publisher​

Answers

Answer: windows is an operating system

Which example uses syntax that demonstrates a transition to a more detailed answer coming up?

Answers

Syntax that demonstrates a transition is that the author is mellow, and he ought never to let anyone down. The new adjustment can be seen as an improvement to life rather than a significant challenge. These are a few instances of syntax used to illustrate the author's ideas.

They explicitly link concepts, phrases, and paragraphs together. Good transitions employ precise language. When referring to a whole notion, try to avoid using pronouns like "this," as it is not always apparent who or what "this" refers to.

A transition is a word or phrase used to connect one idea to another in writing. It is possible for this relationship to occur both within and between paragraphs. Transitions are used to demonstrate how sentences or paragraphs link to one another and to the paper's general idea.

Learn more about transition:

https://brainly.com/question/23859629

#SPJ4

Which term does the osi model use that's different from the tcp/ip model in reference to the terms frame, packet, and segment?

Answers

The term that OSI model use is protocol data unit (PDU). A PDU is a data unit that includes headers and trailers for the specific layer as well as the encapsulated data.

What is OSI model?

The Open Systems Interconnection (OSI) framework depicts 7 layers that data centers use to connect via a network.

It was the first general framework for network communications, and it was adopted by all major computer and telecommunications companies in the early 1980s.

The term used by the OSI model is data protocol unit (PDU). A PDU is a data unit that includes the specific layer's headers and trailers as well as the encapsulated data.

Thus, the answer is protocol data unit.

For more details regarding OSI model, visit:

https://brainly.com/question/14433133

#SPJ1

Legacy mrp systems typically utilized multiple software packages and databases which caused:_____.

Answers

Legacy mrp systems typically utilized multiple software packages and databases which caused the same information to be save in multiple locations.

What is an MRP systems?

Material requirements planning (MRP) is known to be a kind of a system that is often used in the calculation of  some materials as well as the parts that is known to be needed to create or form a product.

It is one that is also known to be made up of three key steps such as taking inventory of the materials as well as the parts on hand, knowing which other ones are required and then keeping a schedule of their production or buying.

Therefore, Legacy mrp systems typically utilized multiple software packages and databases which caused the same information to be save in multiple locations.

Learn more about mrp systems from

https://brainly.com/question/13647161

#SPJ1

Liam, a top football recruit, was frustrated after a difficult loss in the state playoffs. He posted an angry message about his coach on his social media account but deleted it within a few hours. Within a week, he noticed that some of the schools that had been recruiting him stopped reaching out. This demonstrates the idea that actions done online are not permanent social media is a great place to vent feelings players do not need coaches online activity may come with consequences

Answers

The given scenario about Liam who is a top football recruit and the result of his actions when frustrated, and this demonstrates the idea that D: online activity may come with consequences

What is an Online Activity?

This refers to the actions and interactions that occur on the world wide web or otherwise known as the internet where people go to communicate, make new friends and generally socialize and post about themselves.

Hence, we can see that from the given question, it is narrated that Liam gets frustrated after a difficult loss in the state playoffs and then posts an angry message about his coach on his social media account but deleted it within a few hours and he lost his sponsors and potential clubs who wanted his signature.

Therefore, it is crystal clear to see that the correct answer from the list of available answer choices is option D.

Read more about online activities here:

https://brainly.com/question/28142565

#SPJ1

Answer: D) online activity may come with consequences

Explanation:

characteristics and purpose of a motherboard ​

Answers

A motherboard is the central board of a computer or server, to which most components of a computer are connected to each other. It essentially has the task of ensuring that the individual components work properly together.

More Complex Answer:

A motherboard can also be understood as a motorway junction of data. All data streams of a computer or data centre server must go through here, if only because servers are computers that act as a central unit of a network and are thus connected and communicate with other computers. In order for a server to fulfil its tasks such as managing domains, names and files, there are special server motherboards in server systems.

Characteristics:

Different system components can be found on a motherboard depending on the design, equipment and integration density.

Slot for the processor

Power supply for the processor

Clock generator

Real-time metre and battery

BIOS

Chipset

System bus

Memory module slots

Slots for the bus systems

Input/output interfaces

Onboard sound

Storage controllers

DMA controller

Interrupt controllers

Floppy controller

Keyboard processor

Connecters for the PC power supply

Fan connecters

If the mine winch drum diameter is 6m , calculate how far the counterweight will lift for each single rotation of the drum , use the formula C =2 TT r

Answers

The counterweight that would lift for every single rotation of this drum is 18.85 meters.

Given the following data:

Drum diameter, d = 6 meters.

Radius = diameter/2 = 6/2 = 3 meters.

How to calculate the circumference of a circle?

Mathematically, the circumference of a circle can be calculated by using this formula:

Circumference = 2πr

Where:

r represents the radius of a circle.

How to calculate how far the counterweight will lift?

In order to determine the counterweight that would lift for every single rotation of this drum, we would use the formula for the circumference of a circle.

Substituting the given parameters into the formula, we have;

Circumference = 2 × 3.142 × 3

Circumference = 18.85 meters.

Read more on circumference here: brainly.com/question/14478195

#SPJ1

A technician is troubleshooting a 4-year-old computer that takes a long time to boot, and identifies that the bios rediscovers all the hardware at every boot. what action would fix this problem?

Answers

To solve the problem, we need to replace the CMOS battery. Complementary metal-oxide semiconductor is abbreviated as CMOS.

Computers have an inbuilt, battery-operated semiconductor chip called Complementary metal-oxide semiconductor (CMOS) that serves as a data storage device. The computer won't be able to keep the right time or date after it has been switched off if the CMOS battery is failing. For instance, you might see the time on your computer has been set to 12:00 and the date has been changed to January 1, 1990 after turning it on. This warning denotes a failing CMOS battery.

Learn more about CMOS https://brainly.com/question/14767803

#SPJ4

Which big data term describes the analysis of streaming data as it travels around the internet?

Answers

The big data term that describes the analysis of streaming data as it travels around the internet is Velocity. The correct option is D.

What is data?

Data is a quantity of information and a collection that is preserved and documented for future information collection. Data comes in many forms.

Data files are saved in computers, and everything that occurs in a computer is recorded in its memory. The velocity is the speed of data that are travelling from one place to another place over internet in computers.

Therefore, the correct option is D. Velocity.

To learn more about data, refer to the link:

https://brainly.com/question/14726752

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A. Variety B. Veracity C. Volume D. Velocity

True false the gramm-leach-bliley act addresses information security concerns in the financial industry

Answers

Answer: True

Explanation:

Write a program using integers usernum and divinum as input, and output usernum divided by divinum three times.

Answers

user_num = int(input())

divi_num = int(input())

for i in range(3):

   user_num/= divi_num

   print (int(user_num), end=' ')

If we have two inputs 54, 6

Where

usernum = 54

divinum = 3

output will be 18  6  2

Follow the link below to see how you can write a program to execute multiple times

https://brainly.in/question/49503553

#SPJ4

Eric wants to install an isolated operating system. what is the best tool to use?

Answers

The best tool to install an isolated operating system is to use virtualization. To imitate hardware functions and build a virtual computer system, virtualization uses software.

As a result, IT firms can run many operating systems, programs, and virtual systems on a single server. Scale economies and increased efficiency are two benefits that result. A "virtual machine" (VM), for instance, is a tightly-isolated software container that contains an operating system and an application.

Each self-contained VM operates on its own. A single physical server, or "host," can run numerous operating systems and applications by running multiple virtual machines on it.

Learn more about virtual machine https://brainly.com/question/28271597

#SPJ4


Which command should you select to delete a comment?

To delete a comment, right-click the comment and then select the ________ command.

Answers

Answer:

Select delete command

Explanation:

Decisions about advertising and personal selling for a product are a part of ________blank in a marketing program.

Answers

Decisions about advertising and personal selling for a product are a part of the promotional mix in a marketing program.

The promotional mix includes the decisions of the company regarding the promotions of its new or prior products and is made of five parts which include personal selling, advertising, sales promotion, public relations, and direct marketing.

Advertising is the use of paid-for space to communicate products in prime media with the purpose to persuade and inform.

Personal selling is the interpersonal interaction between the organization and the customer to bring about a sale. Usually, this is done by the sales functional area by using either emails, telephone, or face-to-face with the customer.

The promotional mix decides the strategy to be used in these aspects with an intent to make the spending of the marketing budget more effective. The promotional mix usually tries to match the promotional tools with the public objectives and then creates a strategy.

To learn more about the promotional mix, click here:

https://brainly.com/question/15496841

#SPJ4

What form of malware enables a network of infected computers to be commanded remotely after infection?

Answers

A botnet is a form of malware that enables a network of infected computers to be commanded remotely after infection.

The botnet is a type of malware that can be described as a program that includes numerous devices that have been seized by a single operator in order to gather information about a person or organization and send this information to other entities without the consumer's consent and knowledge.

The botnet executive can also manage and run the events of these infected devices. In addition to this, the operator can also use the infected computer for spam on other devices.

These types of malware can get onto your computer by taking advantage of the weakness of the security in your operating system and software programs.

To learn more about botnet, click here:

https://brainly.com/question/13327057

#SPJ4

In the early days of virtual reality systems, what type of training applicaiton, developed by the bell helicopter company, used displays connected to a camera to give a satisfactory sense of reality, and ultimately led to the dist head-mounted display?.

Answers

The US military has been a major force in creating and implementing new virtual reality (VR) technology since the beginning of VR's history.

The military, along with the entertainment sector, is to blame for the most notable advancements in VR technology. We'll examine how virtual reality is used by the military in this article to learn to fly a jet fighter and put out fires on ships, among other things.

Military applications benefit greatly from virtual environments. When properly created, they offer the user a precise replica of actual occurrences in a secure, monitored setting. It can be quite expensive to receive specialised military training, especially for vehicle pilots.

Learn more about virtual reality:

https://brainly.com/question/26705841

#SPJ4

Which of the following best describes an operating system's actions during typical system use? (1 point) A. Communicates between the computer and the end user or external world. B. Performs a specific action or function and processes data for the end user. C The main action an operating system performs during typical use is storing memory. D. Facilitates a computer's basic functions, such as executing applications, communicating between software applications programs and hardware.​

Answers

Answer:

D. Facilitates a computer's basic functions, such as executing applications, communicating between software applications programs and hardware.​

Explanation:

Operating systems generally act as the middle man between programs and hardware, though the code for the applications is usually executed by the hardware directly.

To verify your system meets the requirements to install a program use the ________ window. drive this pc file explorer

Answers

To verify your system meets the requirements to install a program use the System Control Panel window. Users can view and alter system settings using a tool called the Control Panel in Microsoft Windows.

System Control Panel comprises of a collection of applets that let you change user accounts, add or remove hardware and software, access networking settings, and change accessibility settings. Third parties also offer additional applets including input devices, networking utilities, VPN tools, audio and video drivers, and more. Since Windows 1.0, the Control Panel has been a feature of Microsoft Windows.

Learn more about control panel https://brainly.com/question/14284921?

#SPJ4

What kind of cybersecurity risks can be minimized by using a virtual private network (vpn)?
a. use of insecure wi-fi networks
b. key-logging
c. de-anonymization by network operators
d. phishing attacks

Answers

By deploying a virtual private network, cybersecurity threats from phishing attempts can be reduced (VPN).

What does a VPN mean?An encrypted connection between a device and a network via the Internet is known as a virtual private network or VPN. A virtual private network (VPN) allows users to send and receive data via shared or public networks as though their computing tools were directly linked to the personal network by inventing a private network across the latest. The term "Virtual Private Network," or VPN, refers to the possibility of creating a secure network connection when utilizing public networks. VPNs hide your online individuality and encrypt your internet training. This makes it more challenging for outside parties to monitor your internet activities and steal data.

Hence, By deploying a virtual private network, cybersecurity threats from phishing attempts can be reduced (VPN).

To learn more about VPN, refer to:

https://brainly.com/question/9931006

#SPJ4

Overloaded functions must have:_____.
a. different parameter lists.
b. the same number of parameters.
c. different return types.
d. the same number of default arguments.

Answers

Overloaded functions must have different parameter lists, thus the correct answer option to this question is (a) different parameter lists.

Overloaded functions are an important aspect of Object-Oriented programming (OOP). Overloaded functions are the functions with the same name but must have different parameter lists. It means that in a whole program, more than one function can have the same name to perform different tasks but these functions are distinguished by their parameter lists that are different for each of the overloaded functions.  

For overloaded functions, different parameter lists must meet one or more than one of the conditions given as:

Parameter must have different data types  

        sum (int x, int y)

        sum (float x, float y)

Parameters must be different in number

        sum (int x, int y)

        sum (int x, int y, int z)

Parameters must differ in sequence of parameters with respect to data types

        sum (int x, double y)

        sum (double x, int y)

You can learn more about overloaded functions at

https://brainly.com/question/25893745

#SPJ4

When a user interface is created in the window editor, the ide automatically generates the ________ needed to display each component in the window.

Answers

When a user interface is created in the window editor, the ide automatically causes the Graphical User Interface (GUI) required to show each element in the window.

What is the user interface explain?The user interface (UI) of a device is the point of interaction and communication between humans and computers . Desktop monitors, keyboards, mice, and other pointing devices may fall under this category. It also describes how a user interacts with a website or program. The interface of an object describes its capabilities. For instance, you don't care how a light switch turns on; all that counts is that it does so. An interface is an index of all the rates that an entity in object-oriented programming must include to be an "X." An interface is declared with the interface keyword. Total abstract is provided; all methods in an interface are declared with an empty body, and all fields are by default public, static, and final. All of the methods declared in an interface must be implemented by a class that implements the interface.

To learn more about user interface, refer to:

https://brainly.com/question/22811693

#SPJ4

Other Questions
solve pls brainliest Determine whether A B C X Y Z . Explain. A(3,-1), B(3,7), C(7,7), X(-7,0), Y(-7,4), Z(1,4) The cluster of benefits that an organization promises customers to satisfy their needs is referred to as a:________ Darius is trying to explain to his little brother the difference between a friend and an acquaintance. Which would be the BEST example of an acquaintance for Darius to use?A. someone you hang out with every dayB. a person who is part of your familyC. someone you dont know but your friends knowD. a person you know but dont spend much time with Mr. Perez was assigned to determine the density of a sample of nickel metal.When he finished, he reported the density of nickel as 5.59 g/mL. After looking itup, he found the true value of nickel is 6.44 g/mL. Under his cell phone plan, Omar pays a flat cost of $61 per month and $5 pergigabyte. He wants to keep his bill under $70 per month. Which inequality can beused to determine g, the maximum number of gigabytes Omar can use while stayingwithin his budget?O 70 > 5g +61O 705g + 61O 70 5(61+g)Submit Answer A. What is the trend (pattern) with the amount of calories burnedover the 7 day period? Which of the following situations best describes an increase in producer surplus? 1. When the price of pizza increases, producers are enticed to increase the quantity supplied. 2. When the price of pizza increases, the revenue and profit of pizza producers increase. 3. A firm in the pizza market is willing to produce and sell pizzas when the price is $15, but the prevailing market price at which a pizza can be sold is currently $20. 4. If the productivity of the workers that make pizza increases, producers can hire less workers to make the same amount of pizzas as before.question 18 This Native American group lived in the Coastal Zone. They ate lots of seafood and as a result, were responsible for many of the mounds found along the coast. Yemassee O Creek O Cherokee O Catawba The equation d = 4 - (1/15)t represents your distance from home d for each minute you walk t .b. Are you walking towards or away from your home? Explain. points on the line. sunil has 40 counters You are a manager, and you have an employee who has a high external locus of control. you should:_________ What would be lacking if the primary activity of cells of meristematic tissues is stopped? If f(x)=x-5, then match each of the following.1.-52.03.-64.-35.36.-4f(1)f(-1)f(2)f(0)f(5)f(8) A buffer resists change in ph when ___________ amount of acid or base is added to it. Some organizations initiate projects using a simple letter of ____, whereas others use much longer documents or formal contracts. Why is the concept of the invisible hand important in a capitalistic free market society like what we have in the U.S.? Which terms describe this graph? (Choose all that apply)negative correlationlinearinversely proportional relationshipno correlationnon-lineardirectly proportional relationship Marvel consists of calcium, carbon, and oxygen in the ratio 10:3:12a) How much carbon would you find in a 300kg piece of marvel?b) what percentage of marble is calciumHow do I work with these ratios I'm confused 3A toy with a parachute falls vertically from the top of a tall building at 3.0 m/s. Wind causes it to move horizontallyat 1.6 m/s.Figure 1.8(a) In Figure 1.8, draw a scale vector diagram to show the resultant velocity of the toy. State the scale you have used.