The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."
What is a Linux command?A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.
In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."
Read more on Linux commands here: https://brainly.com/question/25480553
#SPJ1
What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.
What type of hackers are motivated by social or political issues?Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated aim or reason.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.
Learn more about Hacktivism from
https://brainly.com/question/5483494
#SPJ1
Write an algorithim and flowchart to check it the temperature is more than 25°. If it more than 25°C switch fan on else off.
Answer:
write the sly flowchart
Explanation:
#stdlib.etc
main()
{
int temp;
bool fan = false;
print("enter the frigin temperature: ");
read(temp);
if (temp > 25)
{
fan = true;
print("the fan is on");
}
else
{
print("the fan is off");
}
return 0;
}
a customer is traveling to a branch office, and the network administrator provides her with a static ip address for her laptop. which should the customer do to use the static ip address
The customer traveling with a provided static IP address should assign the IP in the network adapter settings. Thus, option B is correct.
What is static IP?The complete question is: A customer is traveling to a branch office, and the network administrator provides her with a static IP address for her laptop Which should the customer do to use the static IP address?
A) Run the command "ipconfig configure static"
B) Assign the static IP in network adapter settings
C) Switch the button from dynamic to static on her laptop
D) Disconnect from WiFi and use an Ethernet cable
E) Type the IP address into the browser
A static IP is a setup that is configured manually instead of the DHCP assigned setup. It is a constant and nonchanging IP setup that is used when working remotely.
In the network and sharing system, open the adapter setting and choose the appropriate adapter. Then choose the IPV 4 and check the current internet settings. Choose the desired IP address and then click the OK and save button.
Therefore, option B. static IP is assigned in the network setting option.
Learn more about static IP here:
https://brainly.com/question/18849429
#SPJ1
what is a program answer these question
of grade-6
A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task
Thay is the malicious actor accomplishing this task is done by using the VBA code.
What is The Visual Basic button?It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.
To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.
Read more about the spreadsheet :
https://brainly.com/question/26919847
#SPJ1
What does Fees, Risk Assessment and Returns mean?
Answer:
The term return refers to income from a security after a defined period either in the form of interest, dividend, or market appreciation in security value. On the other hand, risk refers to uncertainty over the future to get this return. In simple words, it is a probability of getting return on security.
Explanation:
You saved your style options as "webstyle.css" in a subfolder called "styles."
what line do you include in the head section of your html file to use your styles?
A line which should be included in the head section of a html file to use these styles is link rel="stylesheet" type="text/css" href="styles/webstyle.css"
What is HTML?HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language that is used for designing, developing and creating websites or webpages.
In Cascaded style sheet (CSS), a line which should be included in the head section of a html file to use these styles is given by:
link rel="stylesheet" type="text/css" href="styles/webstyle.css"
Read more on HTML here: https://brainly.com/question/4056554
#SPJ1
When you start an online course, what should you do to make sure you have access to college resources
As a student starting an online course, you should explore the college website to make sure you have access to college resources.
What is an online course?An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.
As a student starting an online course, you should do the following to make sure you have access to college resources:
Explore the college website.Bookmark links to your course.Search for information with regards to advising, degree requirements, and financial aid.Read more on online course here: https://brainly.com/question/14591988
#SPJ1
Consider the following code using the posix pthreads api:
thread2.c
#include
#include
#include
#include
int myglobal;
void *thread_function(void *arg) {
int i,j;
for ( i=0; i<20; i++ ) {
j=myglobal;
j=j+1;
printf(".");
fflush(stdout);
sleep(1);
myglobal=j;
}
return null;
}
int main(void) {
pthread_t mythread;
int i;
if ( pthread_create( &mythread, null, thread_function,
null) ) {
printf(ldquo;error creating thread.");
abort();
}
for ( i=0; i<20; i++) {
myglobal=myglobal+1;
printf("o");
fflush(stdout);
sleep(1);
}
if ( pthread_join ( mythread, null ) ) {
printf("error joining thread.");
abort();
}
printf("\nmyglobal equals %d\n",myglobal);
exit(0);
}
in main() we first declare a variable called mythread, which has a type of pthread_t. this is essentially an id for a thread. next, the if statement creates a thread associated with mythread. the call pthread_create() returns zero on success and a nonzero value on failure. the third argument of pthread_create() is the name of a function that the new thread will execute when it starts. when this thread_function() returns, the thread terminates. meanwhile, the main program itself defines a thread, so that there are two threads executing. the pthread_join function enables the main thread to wait until the new thread completes.
a. what does this program accomplish?
b. here is the output from the executed program:
$ ./thread2
..o.o.o.o.oo.o.o.o.o.o.o.o.o.o..o.o.o.o.o
myglobal equals 21
is this the output you would expect? if not, what has gone wrong?
The thing which the given program accomplishes is that it creates a method, declares variables, and executes commands if they meet the conditions in the code.
What is a Conditional Statement?This is a type of statement that executes a line of code if a condition is not met.
Some types of conditional statements are:
IF statementIF-ELSE statementNested If-else statement.If-Else If ladder.Switch statement.No, that is not the desired output because the integer should be less than 20.
Read more about conditional statements here:
https://brainly.com/question/11073037
#SPJ1
Match the Job description with the job titles.
What does business informWhat does business information management do?
A.
identify information requirements for coworkers
B.
identify information requirements for different management levels
C.
create project plans for the project management team
D.
produce sales turnover summary for the sales professionals
E.
create financial documents for the finance departmentation management do?
Answer:
B) identify information requirements for different management levels
Explanation:
Business information management is based off of identifying the needs of a company. (This is also a plato answer)
Which programming best practice does saving code snippets help you achieve?
O using consistent indentation and formatting
O documenting all changes and tracking revisions
O avoiding repetition of the same code in a program
O avoiding having to re-create code that you or another programmer has already written
Answer:
When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.
Missing: tracking | Must include: tracking
A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.
The option that can be used to identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.
What is OSPF about?The OSPF is known to be called an open Shortest Path First protocol.
It belongs to the family of IP Routing protocols as it serves as Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.
See full question below
A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.
Shared data
Low overhead, fast convergence
Stability
Multi-vendor routers
Learn more about OSPF from
https://brainly.com/question/14604232
#SPJ1
Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original string in reverse. For example, calling reverse with the string goodbye returns the string eybdoog.Reversing a string involves:
The program is an illustration of recursive functions in Python;
Recursive functions are functions executed from within itself
The python programThe program written in python, where comments are used to explain each action is as follows:
#This defines the function
def revStr(myStr):
#This returns an empty string if the string is empty
if myStr == "":
return myStr
#If otherwise, this returns the reversed string recursively
else:
return revStr(myStr[1:]) + myStr[0]
Read more about python recursions at:
https://brainly.com/question/19089783
#SPJ1
A class that implements an interface must provide an implementation for all ____ methods. Group of answer choices private final static abstract
Answer:
Abstract
Explanation:
I think it’s abstract because, in the question it says that it implements an interface and must provide an implementation for
And my answer was abstract methods.
Which is a best practice that can prevent viruses and other malicious code from being downloaded.
A best practice that can prevent viruses from being downloaded is by not clicking on links in graphic email messages
How to prevent virus or malicious codes?Virus and malicious codes can be installed on a computer through several ways, which include:
Not using an antivirus on the computerClicking on untrusted links in graphic email messagesInsecure downloadsThe above can be prevented by
Installing a genuine antivirusNot clicking on trusted linksAccessing sites with secured downloadsRead more about virus at:
https://brainly.com/question/12543839
#SPJ1
what are the methods of gilding
nonsense will be immediately reported.
write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000
Using the computational language in C++ it is possible to write a code that uses the salary values of the employees of a company dividing between the number of employees.
Writing the code in C++ is possible:#include<stdio.h>
#inc1ude<conio.h>
void main()
{
int i, n, count = 0;
Long int salary[25];
clrscr();
printf(“\n Input salary of 25 persons:- ");
for(i=0;i<25;i++)
scanf("%ld", &salary[i]);
for(i=0;i<25;i++)
{
if(Salary[i]>30000 && salary[i]<40000)
count++;
}
printf("There are %d persons whose salary is in between 30000 and 40000",count);
getch();
}
See more about C++ code brainly.com/question/17544466
#SPJ1
What will be the output, if any, when the user clicks the right mouse button?
from tkinter import
def clicked(event):
print("That hurt.")
widget = Button(None, text='Button')
widget.pack()
widget.bind('', clicked)
widget.mainloop()
O an error statement
O That hurt.
O no output
O Button
The output, if any, when the user clicks the right mouse button is (b) That hurt
How to determine the output?The flow of the program implies that:
When the user clicks the button, the program prints "That hurt" without the quotes.
This action is on the third line of the program
Hence, the output, if any, when the user clicks the right mouse button is (b) That hurt
Read more about programs at:
https://brainly.com/question/16397886
#SPJ1
advantages and disadvantages of algorithm
Answer:
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
Explanation:
It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program
Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.
To notify the browser that we have JavaScript code, we should use .............
Answer:
almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
When an interviewer asks "tell me about yourself", you should tell them about your childhood past. please select the best answer from the choices provided t f
In the interview when the candidate is asked about yourself then telling about childhood past is not correct. Therefore the given statement is false.
What is an interview?An interview is an interaction or a conversation between an employer and the interested candidate. In the conversation the interviewee is asked about their education, family background, and work experiences.
When an interviewer ask about tell me about yourself, then the interviewee should not tell about their childhood past, rather the interviewee should give few information about their family, education, and working.
Therefore, the given statement is false.
Learn more about interview, here:
https://brainly.com/question/13073622
#SPJ1