Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.
The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."
What is a Linux command?A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.
In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."
Read more on Linux commands here: https://brainly.com/question/25480553
#SPJ1
To notify the browser that we have JavaScript code, we should use .............
Answer:
almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console
ANSWERS FOR PLATO!!!
What does the second element in a pair of HTML tags contain?
ANSWER: /
when would you use the code snippet <input...(randome code stuff)...> American?
ANSWER: while inserting a RADIO BUTTON
assume you are creating a website for school... yada yada,
ANSWER: <img>
Why is it preferable to code web pages in HTML format?
ANSWER: to display properly as search results in all browsers
drag tiles, somthinf about creating a web page and wich dose the html tags define
new paragraph ---> <p>
define a term ---> <dd>
define single line break ---> <br>
define heading ---> <h3>
HOPE THIS HELPS GUYS YOU GOT THIS KEEP ON KEEPING ON <3<3<3<3 #platogang #edementumegang
The thing which the second element in a pair of HTML tags contain is "/" and is known as the Closing Tag.
What is an HTML Tag?This refers to the keywords that are used in the building block of a website to indicate how a web browser would interpret and display the content.
Hence, we can see that in HTML tags, there are always the Opening and Closing Tags that are used to enclose lines of code and when paired together are known as container tags.
Read more about HTML elements here:
https://brainly.com/question/9069928
#SPJ1
Pls help me po:{
I need the answer lang po talaga , pls:{
Answer:
for cutting it's scissors for measuring it's the tiny measurement spoonlikes for mixing it's the blender and preparatory
Write a Java expression that converts the value of 'y' into an integer, and assigns the value to 'x'.
[tex]\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar answer:: \bigstar}}}}}}[/tex]
int y = (int) y;
int x = y;
Hope it helps..♪A good algorithm should have which three components?
OA. Commands, inputs, and outputs
OB. Clarity, readability, and sequencing
OC. Steps, order, and outcomes
OD. Clarity, simplicity, and brevity
A good algorithm should have these three components: C. steps, order, and outcomes.
What is an algorithm?An algorithm simply refers to a standard formula which is made up of a set of finite steps and instructions that are executed on a computer system, in order to enable a software solve a particular problem under appropriate conditions.
In Computer technology, there are three (3) components that a good algorithm should have these include the following:
StepsOrderOutcomesRead more on algorithm here: brainly.com/question/24793921
#SPJ1
What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service
Answer:
code injection
Explanation:
Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.
Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)
Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)
Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests
Who invented Napier's Bones and when? Write its functions. field of comm
Explanation:
Napier's Bone was invented by Scottish mathematician John Napier in 1617 AD.... It's function is that it was very useful for finding multiplication at that time...
Consider the following method: public int mystery(int n) { if(n > 6) { return 1 mystery(n - 1); } return n % 3; } What is the value of mystery(10)
Answer:
Ans1--- The output is 9 Explanation--- mystery(5)=mystery(4)+2 mystery(4)=mystery(3)+2 mystery(3)=mystery(2)+2 mystery(2)=2+1=3
Why is it important for companies to invest in building a complete data and analytics platform?.
Companies need to invest in data and analytics platform as it generates insights by housing data in one place and converting it into easily consumable information at high speed.
Why is it vital to use the analytics of a platform?Analytics platforms is known to have helped a lot of data scientists as it has help to boast access to a lot of data sources and hardware.
Note that Companies need to invest in data and analytics platform as it generates insights by housing data in one place and converting it into easily consumable information at high speed.
See options below
It produces cultural support and alignment, a growth mindset, and new ideas and priorities to improve business processes.
It creates awareness of what data can do to improve business processes.
It generates insights by housing data in one place and converting it into easily consumable information at high speed.
It stores large amounts of data that are easily retrievable for future business growth.
Learn more about analytics platform from
https://brainly.com/question/26468036
#SPJ1
The destination transmission control protocol (TCP) process has set a 1,000-byte receive buffer window. The source TCP sequence number starts at 23,100 and sends the following segments, in order: Segment 1-200 bytes; Segment 2-300 bytes; Segment 3-200 bytes; and Segment 4-300 bytes. The last acknowledgment the source received was sequence number 23,600 saying the receive buffer can now hold 800-300 byte streams. The retransmission timer for sequence number 23,600 has expired, so what will the source TCP do next
Because the retransmission timer for sequence number 23,600 has expired, the source TCP will trigger a process that resends segments 3 and 4.
What is TCP/IP?A term in Computer Networking Protocol, it stands for Transmission Control Protocol/Internet Protocol.
It serves the function of indicating how data is transported over the internet by ensuring that there is communication from end to end.
This end-to-end communication process is able to spot how such data can be sectionalized into packets, addressed, routed, transmitted and how it is received when it gets to the terminal point.
Learn more about TCP at:
https://brainly.com/question/17387945
#SPJ1
in which part of the scratch interface does a programmer combine code blocks to build the program?
a. sprite info pane
b. block palette
c. stage
d. scripts area
Answer:
D
Explanation:
The sprite info pane is for an overview over your sprites and their visibility, coordinates, etc.
The block palette is where you select blocks from.
The stage is where your figures move and do stuff.
The scripts area is where you combine blocks from the palette together.
what is a program answer these question
of grade-6
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
pls help will mark as brainliest i need help in html.
Answer:
This is how I did it. Try it out and see if it works for you
A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task
Thay is the malicious actor accomplishing this task is done by using the VBA code.
What is The Visual Basic button?It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.
To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.
Read more about the spreadsheet :
https://brainly.com/question/26919847
#SPJ1
write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000
Using the computational language in C++ it is possible to write a code that uses the salary values of the employees of a company dividing between the number of employees.
Writing the code in C++ is possible:#include<stdio.h>
#inc1ude<conio.h>
void main()
{
int i, n, count = 0;
Long int salary[25];
clrscr();
printf(“\n Input salary of 25 persons:- ");
for(i=0;i<25;i++)
scanf("%ld", &salary[i]);
for(i=0;i<25;i++)
{
if(Salary[i]>30000 && salary[i]<40000)
count++;
}
printf("There are %d persons whose salary is in between 30000 and 40000",count);
getch();
}
See more about C++ code brainly.com/question/17544466
#SPJ1
The function ____ can check whether an expression meets the required conditions; if the conditions are not met, it terminates the program.
Answer:
assert()
Explanation:
The assert function takes a boolean as an input, and when true, it just continues the flow, however if false it prints an error and calls exit.
Match the Job description with the job titles.
A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.
The option that can be used to identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.
What is OSPF about?The OSPF is known to be called an open Shortest Path First protocol.
It belongs to the family of IP Routing protocols as it serves as Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.
See full question below
A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.
Shared data
Low overhead, fast convergence
Stability
Multi-vendor routers
Learn more about OSPF from
https://brainly.com/question/14604232
#SPJ1
What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.
What type of hackers are motivated by social or political issues?Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated aim or reason.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.
Learn more about Hacktivism from
https://brainly.com/question/5483494
#SPJ1
Which programming best practice does saving code snippets help you achieve?
O using consistent indentation and formatting
O documenting all changes and tracking revisions
O avoiding repetition of the same code in a program
O avoiding having to re-create code that you or another programmer has already written
Answer:
When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.
Missing: tracking | Must include: tracking
Give three reasons why it is important to have hci-based software programs.
need this soon
The three reasons why it is important to have HCI-based software programs As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.
What is HCI and why is it important?The Role of Human Computer Interaction withinside the Workplace. Human Computer Interaction (HCI) and User Experience (UX) are interdisciplinary fields that draw on human-focused disciplines like psychology and sociology to layout and increase technological merchandise that meet human needs.
As its call implies, HCI includes 3 parts: the user, the pc itself, and the methods they paint together.HCI is vital on account that it'll be important for items to be extra successful, safe, helpful, and functional. It will make the users revel in extra fun withinside the lengthy term. As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.
Read more about the software programs:
https://brainly.com/question/1538272
#SPJ1
Please help quick!! 20 points
a table is a ___ of rows and columns that provides a structure for presenting data.
Answer:
vertical and horizontal
Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONITOR CD Bay PRINTER TOWER CASE CENTRAL PROCESSINGENIT is an electronic device that retrieves, and processes shows you what is going on in the computer. is the first image you see on your screen when the computer is is used for telling the computer what to do. is used for typing documents. is used for putting documents on paper. you can insert a CD or Compact Disc. is is box inside and shaped 1) A 2) The 3) The data. switched on. 4) The 5) The 6) The 7) In the 8) The it
Answer:
Explanation:
Monitor is an electronic device that retrieves, and processes shows you what is going on in the computer.
Desktop is the first image you see on your screen when the computer is is used for telling the computer what to do.
keyboard
is used for typing documents. Printer is used for putting documents on paper. CD Bay you can insert a CD or Compact Disc. is is box inside and shaped
This program has a bug. When the green flag is clicked, nothing happens. How would you fix it?
A. Change the number inside the “Move” block
B. Change the number inside the “repeat” block
C. Make the sound louder with the purple block
D. Connect the event block directly to the “repeat” block
Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original string in reverse. For example, calling reverse with the string goodbye returns the string eybdoog.Reversing a string involves:
The program is an illustration of recursive functions in Python;
Recursive functions are functions executed from within itself
The python programThe program written in python, where comments are used to explain each action is as follows:
#This defines the function
def revStr(myStr):
#This returns an empty string if the string is empty
if myStr == "":
return myStr
#If otherwise, this returns the reversed string recursively
else:
return revStr(myStr[1:]) + myStr[0]
Read more about python recursions at:
https://brainly.com/question/19089783
#SPJ1
i hs no life hahahaha
Answer:
PLEASE ANYONE HELP WITH THIS
Explanation:
Answer:
me too lol
Explanation:
Which statement best describes one reason why assembly language is easier
to use than machine language?
Answer:
machine language uses binary code and assembly language uses mnemonic codes to write a program.
Explanation:
In a nutshell, machine language uses binary code, which is almost impossible for humans to decipher, whereas assembly language uses mnemonic codes to write a program. Mnemonic codes make it simpler for humans to understand or remember something, and so make the language a bit easier for humans to use than machine code.
The entities on which data are collected are _____.
Answer:
The entities on which data are collected is known as variables.
Explanation: