The Unix who command shows for each logged-in user the

A. terminal name
B. office address

A. terminal name

Computer Science & Information Technology

You might also like to view...

Correctly entering the user ID and password on your college network is an example of

a. authentication. b. scalability. c. packet screening. d. virtualization.

Computer Science & Information Technology

When a leader is removed from one paragraph in a tabbed list, it is automatically removed from all other paragraphs in the list

Indicate whether the statement is true or false

Computer Science & Information Technology