in centos 7 using an extension on script files is optional. however, some linux system administrators prefer to add a file extension to their scripts. what file extension is commonly used for this purpose?

Answers

Answer 1

Some linux system administrators prefer to add a file extension to their scripts. The  file extension that is commonly used for this purpose is .sh.

What is a SH file?

A person can run a shell script called a sh file at a terminal. You can tell the script you referenced is a bash script by opening it and looking at the shebang, or magic line, in the first line of the file.

Therefore, one can say that a scripting language instructions file with the extension "sh" includes computer programs that may be run by the Unix shell. It may include a string of commands that are executed one after the other to perform actions like processing files or running programs, among other things.

Learn more about file extension from

https://brainly.com/question/28578338
#SPJ1


Related Questions

security a has a standard deviation of 15 and security b has 25. based on the assumption of the camp model, security b must have a higher rate of return in equilibrium. true false

Answers

False. According to the CAPM model, the expected rate of return for security b does not necessarily have to be higher than security a. The expected rate of return for each security is determined by its level of risk, which is reflected in the standard deviation of its return.

The Relationship between Risk and Expected Rate of Return in the CAPM Model

The capm model posits that the expected rate of return for a security is determined by its level of risk. This risk is reflected in the standard deviation of the security's return. Therefore, if security a has a standard deviation of 15 and security b has a standard deviation of 25, the expected rate of return for security b does not necessarily have to be higher than security a.

Learn more about the CAPM Model: https://brainly.com/question/17219340

#SPJ4

which field of an x.509v3 certificate specifies where the certificate revocation list (crl) for the ca is found at? be specific.

Answers

In an X.509v3 certificate, the Authorities Information Access (AIA) attribute specifies where the CA's revocation list (CRL) can be obtained.

The definition of certification

When a system, product, or service is certified, it means that an impartial organization has given written confirmation (a certificate) that it satisfies a set of criteria. It is the official authentication or verification of particular features of an entity, whether it is a thing, a person, or an organization. External reviews, training, assessments, or audits frequently, but not always, offer this validation. A particular organization can get certified by being accredited.

To know more about certification
https://brainly.com/question/14570536
#SPJ4

use your knowledge of management communications to select the three missing labels from the following image. sources: adapted from mintzberg, h. (1973). the nature of managerial work. new york, ny: harper and row; daft, r. l. (2005). the leadership experience (3rd ed., p. 346). cincinnati, oh: south-western. a. b. c.

Answers

A leader is the person in charge, the person who persuades others to follow. A great leader instills trust in others and motivates them to take action.

What is the true meaning of a leader?

A leader is someone who inspires followers' passion and motivation. A leader is someone who has a vision and a plan for achieving it. A leader is someone who ensures their team has the resources and tools they need to succeed.

Communications management is the systematic planning, implementation, monitoring, and revision of all communication channels within and between organizations.

An overview was given as the image isn't given.

Learn more about leader on:

https://brainly.com/question/12522775

#SPJ1

which of the following components are the siem's way of letting the it team know that a pre-established parameter is not within the acceptable range?

Answers

Answer:Alerts

Explanation:

what was the original motivation for the creation of the internet? a. to create a communications network that could survive a nuclear attack b. to create new revenue sources for media conglomerates c. to facilitate communication between government and citizens d. to enable large-scale social networking

Answers

The original motivation for the creation of the Internet was based on its evolution from a military experiment conducted in the context of the Cold War (option A), however, this same technology began to be implemented in the political, economic or social environment

What is the internet?

Is a global network of computer networks whose purpose is to allow the free exchange of information among all its users, the system became a pillar of communications, entertainment and commerce in all corners of the planet. since the creation of smartphones, its mass has increased since it fulfills the same functions as a computer and not only for calls and text messages.

For more about internet here https://brainly.ph/question/3076207

#SPJ4

You plan to implement a new security device on your network. Which of the following policies outlines the process you should follow before implementing that device?
answer choices
Change management
Acceptable use
Resource allocation
SLA

Answers

Change management

Change management policies outlines the process you should follow before implementing a new security device on your network.

What is Change management policies?

Change Management attempts to reduce the risk associated with Change. Change is defined by preferred practices as "the addition, modification, or removal of anything that may have an effect on University IT services." Modifications to IT infrastructure, applications, systems, processes, documentation, supplier interfaces, and so on are all included.

Scope:

The owner of the change must submit a change request via the ITS Change Management module within Ivanti Service Manager (ISM). The change should not be implemented until it has been reviewed and approved in accordance with the procedures outlined in this policy.

To know more about Change management policies, visit: https://brainly.com/question/28096717

#SPJ4

elektra is part of a team that conducts meetings and conferences with the aid of information technology. this is so because the other team members are dispersed across the country. elektra is most likely to belong to a team.

Answers

Virtual refers to something that is either not what it seems to be or has no physical presence.

What does virtual meeting mean?

Using their mobile or internet-connected devices, users can use a virtual conference to connect virtually when they are in different physical locations. Virtual meetings are used by people for a variety of purposes, including as communicating with loved ones, receiving teletherapy, and working with a dispersed workforce.

Virtual meetings are frequently held in the business sector when employees are dispersed, but occasionally employees in the same workplace will choose one so they won't have to leave their workstations. In addition to growing in popularity for business meetings, virtual gatherings with friends and family are also routine. You can hold virtual meetings anywhere and with anyone.

To know more about virtual, check out:

https://brainly.com/question/13269501

#SPJ1

which of the following is true about database tables? a.) each table should only have one type of field. b.) each database should only have one table. c.) each table should only have one type of record. d.) each record should only have one table.

Answers

Each record should only have one table is true about database tables. Hence, the relevant option for this question will be option (d)

What is a record in database?

A record in a database is a group of data related to one topic or category that is arranged in a table. Tuples are another name for database records. A group of records may be referred to as a table, a data set, or a data file. The table's data can take many different shapes. It can be numerical, like a person's weight or financial information pertaining to a company's annual spending. Non-numerical details like a person's name and job title are also possible inclusions in the data.

A few crucial components are present in the database itself:

Individual records are shown as rows. These span a spreadsheet horizontally.The categories of data for each record are represented by columns. Attributes is another term for the columns. On a spreadsheet, they are arranged vertically.Each unique piece of information that is placed into the database is called a field. In a database, primary keys are distinct data elements that cannot be repeated.

To know more about, database, visit :

https://brainly.com/question/22536427

#SPJ1

As a concurrent record reviewer for an acute care facility, you have asked Dr. Crossman to provide an updated history and physical for one of her recent admissions. Dr. Crossman pages through the medical record to a copy of an H&P performed in her office a week before admission. You tell Dr. Crossman
- a new H&P is required for every inpatient admission
- that you apologize for not noticing the H&P she provided
- the H&P copy is acceptable as long as she documents any interval changes
- Joint Commission standards do not allow copies of any kind in the original record

Answers

As a concurrent record viewer for an acute care facility, in the case mentioned I would convey to dr . Crossman as the H&P copy is acceptable as long as she documents any interval changes

What is the situation here?

I would explain that since im a concurrent record viewer the documents must be updated as frequently and it should not be not earlier than 30 days for any health care-related documents also considering the situation here dr.crossman submits the medical record before a week hence I would convey as if the patient submits the documents physically now then it would be appreciated and considered and the H&P copy is acceptable as long as she documents any interval changes

Hence to conclude that the documents has to be submitted earlier

To know more about discussions follow this link:

https://brainly.com/question/2290843

#SPJ4

Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both single words. Then the program outputs last name, first name. End with newline.

Answers

Below is the program written in C++ that reads a person's first and last names separated by a space, assuming the first and last names are both single words.

Coding Part:

#include<iostream>

using namespace std;

int main(){

string lname, fname;

cout<<"First name: ";

cin>>fname;

cout<<"Last name: ";

cin>>lname;

cout<<lname<<", "<<fname;

return 0;

}

Explanation of all the steps:

This line declares lname, fname as string to get the user's last name and first name, respectively

string lname, fname;

This line prompts the user for first name

cout<<"First name: ";

This line gets the user first name

cin>>fname;

This line prompts the user for last name

cout<<"Last name: ";

This line gets the user last name

cin>>lname;

This line prints the desired output

cout<<lname<<", "<<fname;

To know more about C++ Programming, visit: https://brainly.com/question/13441075

#SPJ4

what is the recommended length of time an individual should wash his or her hands to remove pathogens?

Answers

Evidence suggests that washing hands for roughly 15 to 30 seconds removes more germs from hands than washing for shorter times.

Explain about the pathogens?Pathogens include various bacterial, viral, and fungal species. A pathogen sickens a host by infecting it. Since pathogens cause infections, the term "infectious agent" is frequently used to describe them. Infections concentrate on surviving and procreating, just like all other creatures do.Pathogens can ill-effect their hosts in numerous ways. The most obvious mechanism is direct tissue or cell damage brought on by the infection during replication. Typically, this happens when toxins are produced that allow the pathogen to reach new tissues or leave the cells they replicated in.Viruses, bacteria, fungi, and parasites are the four most common forms of pathogens. Pathogens come in a variety of forms.

To learn more about  pathogens refer to:

https://brainly.com/question/1273396

#SPJ4

A(n) _____ is a small picture that represents a program, file, or hardware device.

Answers

A(n) icon is a small picture that represents a program, file, or hardware device.

Does icon mean symbol?

The term symbols and icons stand for different things, however an icon is a visual depiction of the thing it represents, whereas a symbol is more abstract. A symbol represents ideas or products, but an icon merely depicts things that are readily apparent.

Therefore, on the desktop of a computer, icons appear as little images. The act of using the tiny icon, you can determine whether a file is a folder, a data file, or an executable software file.

Learn more about icon from

https://brainly.com/question/13777322
#SPJ1

the set of methods that can be used to acquire, organize, store, manipulate, and transmit information is known as .

Answers

The set of methods that can be used to acquire, organize, store, manipulate, and transmit information is known as information system.

What is information system?

Information systems are composed of a coordinated group of parts for the purposes of data collection, data processing, data storage, and the provision of knowledge, information, and digital goods. Information systems are essential to the operation and management of businesses and other organizations, as well as to the communication and interaction with clients and suppliers, as well as to market competition.

Electronic markets and supply chains between organizations are managed by information systems. Businesses, for instance, use information systems to process financial accounts, manage their human resources, and advertise online to potential customers. The information systems that power many large businesses form their foundation.

Learn more about information system

https://brainly.com/question/14688347

#SPJ4

Object program is a machine language version of a program that results from compiling the procedural language. True or False.

Answers

True, object program is defined as the machine language of a program resulting from the compilation of procedural language.

Object Program

Object program is a program in machine language. Usually users write computer programs using high-level languages or assembly languages. If a program is written in a high-level language, it will be converted to executable machine form using a compiler.

If a program is prepared in assembly language, it is usually converted to machine executable form using an assembler. The output of a compiler or even an assembler is called an object program. They can be directly reached by machine.

Learn about Object-oriented programming: https://brainly.com/question/4560494

#SPJ4

write a program 'sorting' that prompts a user to enter a list and displays whether the list is sorted or not.

Answers

Enter list: 1 1 3 4 4 5 7 9 11 21. The list is already sorted.

what is coding?The process of carrying out a specific computation through the design and construction of an executable computer programme is known as computer programming. Analysis, algorithm generation, resource use profiling, and algorithm implementation are some of the duties involved in programming.

import java.util.ArrayList; import java.util.Scanner;  public class Sorting {     public static void main(String[] args) {         Scanner scanner = new Scanner(System.in);         System.out.print("Enter list: ");         ArrayList<Integer> list = new ArrayList<>();          String[] nums = scanner.nextLine().split(" ");         for (String num : nums)             list.add(Integer.parseInt(num));          boolean flag = true;         for (int i = 1; i < list.size(); i++) {             if (list.get(i) < list.get(i - 1)) {                 flag = false;                 break;             }         }         if (flag)             System.out.print("The list is already sorted");         else             System.out.print("The list is not sorted");     } }

To learn more about coding, refer to

https://brainly.com/question/22654163

#SPJ4

write a function called remove odd digits that takes an integer parameter and returns a number with all odd digits removed. (assume the input parameter is not negative.).

Answers

The code for - A function called remove odd digits that takes an integer parameter and returns a number with all odd digits removed is given below -

What is parameter ?

In general, a parameter is any feature that aids in defining or classifying a certain system (meaning an event, project, object, situation, etc.). In other terms, a parameter is indeed a component of a system that is crucial or useful for recognizing the system or assessing its functionality, status, or other characteristics. In some fields, such as mathematics, programming skills, engineering, statistics, logic, languages, and electronica production, the term "variable" has much more precise definitions.

CODE

function removeOddDigits(num) {

 let newNum = ''; // create a new empty string
  // iterate over each digit in the number parameter

 for (let i = 0; i < num.toString().length; i++) {

   // check to see if the current digit is even

   if (num.toString()[i] % 2 === 0) {

     // if the digit is even, add it to the newNum string

     newNum += num.toString()[i];

   }

 }

 return +newNum; // return the newNum as a number

}

To know more about parameter
https://brainly.com/question/13566907
#SPJ4

question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols? a. mac b. llc c. physical layer d. ip

Answers

The correct answer is MAC (Media Access Control).

What is MAC?

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

https://brainly.com/question/29388563

#SPJ1

Which combination of keys is used to exit from terminal of Linux?
a) ctrl + t b) ctrl + z
c) ctrl + d d) ctrl + e

Answers

The combination of keys is used to exit from terminal of Linux is CTRL + D.

Linux has a lot of shortcuts, one of which is CTRL + D which works log you out of the current terminal. If you are using a terminal directly, the application will be closed immediately.

Learn more about Linux Shorcuts at : brainly.in/question/18123958

#SPJ1

Answer:

c. ctrl + d

Explanation:

question 4 what is the purpose of dns round robin technique? 1 point to resolve an ip to a domain name to redirect traffic from one domain name to another to route traffic to different destinations, depending on factors like location, congestion, or link health to balance traffic

Answers

The fundamental purpose of round robin DNS is to evenly divide the load among geographically dispersed Web servers.

What does the DNS round robin technique accomplish? Mutual exclusion .The primary function of DNS is to evenly divide the load among geographically dispersed Web servers.Routing method that distributes the requests among a list of IP addresses in an orderly form, balancing the traffic for those addresses.A DNS query is an information request to a DNS server.For instance, your browser performs a DNS query each time you input a domain name, such example.com, to find the IP address associated with that domain name. Circle RobinBy controlling the Domain Name System's (DNS) responses to address requests from client computers in accordance with an appropriate statistical model, DNS is a technique for load distribution, load balancing, or fault-tolerance provisioning multiple, redundant Internet Protocol service hosts (e.g., Web servers, FTP servers).

To learn more about round robin technique refer

https://brainly.com/question/16085712

#SPJ1

which of the following statements is true about a data model? group of answer choices a data model is a plan or blueprint for a database design. a database design is more generalized and abstract than a data model. a data model is equivalent to a physical design. data modeling occurs in the implementation step of the systems development life cycle

Answers

A data model organizes data elements and standardized how the data elements relate to one another.

What is Data Modeling? The most crucial stage of any analytical project is data modeling. Data models are used to build databases, fill data warehouses, manage data for analytical processing, and implement applications that give users meaningful access to information.A process called data modeling is used to specify a database's data structure. In other words, it's a method you can use to build a database from scratch. This could be for a straightforward database where you're storing details about customers and products, or it could be for something much more complex, like a system used to track sales trends across a global network of stores.

To Learn more About data model refer To:

https://brainly.com/question/27250492

#SPJ1

while kari was searching the internet, her computer was infected by a virus. what problem can kari expect as a result?

Answers

The code will set up software that appears helpful but really threatens the security of the Kari PC.

What is a computer virus?

Your computer performing weirdly, glitching, and operating unusually slowly are all symptoms of an infection.

Utilizing an antivirus tool made to securely clean your system is the simplest approach to getting rid of infections.

There may be extremely particular circumstances in which you must launch this application if a virus is already present on your machine.

Therefore, the code will set up software that appears helpful but really threatens the security of the Kari PC.

Learn more about computers, here:

https://brainly.com/question/27172405

#SPJ1

codescan is one of the tools copado uses to execute code scanning. from which copado version is this tool supported?

Answers

CodeScan copado version is this tool supported.

What is mean by copado?Currently, Copado performs code reviews using two tools:An open-source static code analysis tool is PMD. You can use the built-in RuleSet while using PMD with Copado and add your own unique rules as well.CodeScan: CodeScan is a utility for SonarQube that improves code quality. It enables you to design your own criteria, run tests at night, and set alerts with timelines to track changes over time. Several IDE plugins and a self-hosted cloud offering are offered by CodeScan.You may find code mistakes, inefficiencies, and bad habits using static code analysis (SCA) before they develop into costly issues. Code analysis can be used to automatically check developers' code and impose best practices.

To learn more about copado refer to:

https://brainly.com/question/27817373

#SPJ1

members should use the aicpa conceptual framework for independence to a. come to different conclusions than the interpretations of the code of professional conduct. b. evaluate threats

Answers

Members should use the AICPA conceptual framework for independence to '' Understand the rules on confidential client information and acts discreditable to the profession''.

What is the AICPA conceptual framework?The conceptual framework technique used in these two frameworks is a method of detecting, assessing, and dealing with risks to rule compliance brought on by a particular connection or condition that is not otherwise covered by the code.The Principles of COMPOSITION, APPLICABILITY, AND COMPLIANCE provide the basis for the Rules that control how members conduct professional services.The inclusion of two conceptual frameworks, one for members in public practice and one for members in business, is the most significant content change in the revised AICPA Code.The AICPA Professional Ethics Division is creating a toolkit to aid in implementation. It will concentrate on how to apply the conceptual frameworks, including discussion of the particular types of threats that may exist and safeguards that may be used to reduce or eliminate those threats to an acceptable level.

Learn more about AICPA conceptual framework refer to :

https://brainly.com/question/14315954

#SPJ1

which type of network model describes the functions that must be completed at a particular layer, but does not specify exactly how each protocol should work?

Answers

Answer:

Reference model

Explanation:

A(n) _____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions.
a. artificial agent
b. knowledge engineer
c. expert system
d. intelligent agent
Answer: b

Answers

An knowledge engineer is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions.

What is programmer?

Programmer is defined as a person who writes/creates computer programs by instructing a computer with precise programming instructions. Programming languages are the names of the different languages in which the instructions are provided. Programming languages come in numerous varieties.

A knowledge engineer is defined as a specialist in the discipline of incorporating sophisticated logic into computer systems in an effort to replicate human decision-making and complex cognitive activities. High-quality data expertise and in-depth understanding of problem-solving techniques are prerequisites for knowledge engineering.

Thus. an knowledge engineer is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions.

To learn more about programmer, refer to the link below:

https://brainly.com/question/13956629

#SPJ1

which type of user account should be used for everyday computing? (1 point)standarddefaultguestadministrator

Answers

Standard type of user account should be used for everyday computing. Thus, option A is correct option.

What is an user account?

In a computer or computing system, a user account is a unique identity made just for that person. Additionally, machine entities can have user accounts created for them, including root and administrator accounts for system administration and service accounts for running programs and storing system files and processes.

All of these accounts fall under the category of privileged accounts, which are user accounts with additional rights over regular user accounts. Accounts for databases, services, root, administrators, and systems are additional examples.

An interactive account or a standard user account are other names for the typical user account for a specific person. These users are typically able to access the computer with a password and run programs.

Learn more about standard user account

https://brainly.com/question/13747434

#SPJ4

you've encountered system problems that require you to reboot the system. you want to inform users that the system will shut down and reboot. in this lab, your task is to send a command to reboot the system in 5 minutes.

Answers

Select UEFI and Legacy in the CSM under the reboot option filter section. Select the driver's listing from the rebootable USB device using the arrow keys, and then press Enter.

Restarting a working computer with hardware (such as a power button) as opposed to software is known as a reboot. Rebooting is occasionally required for a variety of reasons, including updating the operating system, fixing errors, and reinitializing hardware or drivers.

Press and hold down the computer's power button to initiate a hard or cold reboot. The computer ought to shut off after five to ten seconds. Wait a short while after turning the computer off before turning it back on.

All open programs on a computer should close when it restarts. The computer should then briefly turn off before coming back on.

To know more about reboot click here:

https://brainly.com/question/29314084

#SPJ4

which variables are in scope at the point labeled // point a? in other words, which variables exist at that point in the code?

Answers

Hmmmm? Good Question I cant figure that out

BRAINLIEST

55

60

65

x = 50

while (x < 65):

x = x + ____

print (x)

Answers

Answer:

is there any other information? I got 1.3

sorry if it's wrong

true or false: nonusers of the internet are disproportionately older, high-income, and well-educated.

Answers

Im not sure but I think False
Other Questions
clive is a clinical psychologist and his sister grace is a psychiatrist. the main difference between these two professionals would be the fact that clive would What effect would the pressure in the Marianas Trench have on most animals and humans? determine the area under the standard normal curve that lies to the right of the z-score 0.97 and to the left of the z-score 0.59. your company sells $47,000 of one-year, 12% bonds for an issue price of $42,500. the journal entry to record this transaction will include a credit to bonds payable in the amount of: Pls help!! The most helpful answer gets brainliest!!! which sentence would best create a strong, descriptive image in the readers mind if it were added after sentence 4? the trading of futures contracts in major currencies and offering price transparency and efficiency in addition to elimination of counterparty risk due to guaranteed payments on contracts is called . which of the following aspects of bureaucratic rule-making are accurate? which aspects are inaccurate? Kavion and Samantha like to collect stamps. Kavion 45 has stamps. This is 3 times 2 less than the number of stamps Samantha has. The relationship between the prices of the underlying stock, a call option, a put option, and a riskless asset is referred to as the _____ relationship.A. put-call parityB. covered callC. protective putD. straddleE. strangleA. put-call parity jesse and walt are considering going in together on the purchase of a new rv. if they buy the rv, then they will each have equal access to it. jesse's reservation value of the rv is $14000. walt's reservation value is $20000. 1st attempt part 1 (1 point) suppose the rv is priced at $27000. in which of the following cases will jesse and walt buy the rv? choose one or more: a. both walt and jesse attempt to free ride on the other, and neither reports his reservation value truthfully. b. both jesse and walt both truthfully reveal their reservation values. c. walt reports his reservation value truthfully, but jesse free rides on walt and does not report truthfully. d. jesse reports his reservation value truthfully, but walt free rides on jesse and does not report truthfully. part 2 (1 point) now suppose the price of the rv is $11500. in which of the following cases will jesse and walt buy the rv? choose one or more: a. jesse reports his reservation value truthfully, but walt free rides on jesse and does not report truthfully. b. both walt and jesse attempt to free ride on the other, and neither reports his reservation value truthfully. c. walt reports his reservation value truthfully, but jesse free rides on walt and does not report truthfully. d. both jesse and walt truthfully reveal their reservation values. true or false: store design and visual merchandising are elements of a retailer's communication mix. Aisha's softball coach can buy equipment for 8 players for $3080 or for 6 players for $2430. Which option is the better deal? Explain. Thesis statement for To what extent is the Life of Pi movie a successful adaptation of the novel? Can someone help me out with this question? I've been practicing it this one is confusing to me enantioselective total synthesis of the antifungal natural products chlorotetaine, bacilysisn, and anticapsin and of related compounds: revision of the relative configuration in an ideal competitive market, a.excludable goods are minimized. b.there are no depleteable goods. c.social surplus is maximized. d.external benefits are maximized. as part of her project, an individual is required to work with someone outside of her department in order to complete some tasks. the communications department in her office agreed to help create some publicity slides for their new product, but in doing so, disrupts the timeframe of one of their fellow team members in their own department. what should the individual do? why do we say that force is a vector quantity? it has magnitude only because forces can be unbalanced it has direction only it has magnitude and direction because forces can be balanced next people are often not aware of the stereotypes they are using, which best illustrates the fact that stereotypes often occur: