1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
3 years ago
15

Which package is required for shadow passwords to be enabled?.

Computers and Technology
1 answer:
Lelechka [254]3 years ago
3 0

Answer:

For shadow passwords the shadow-utils package to be enabled

Explanation:

The shadow-utils package includes the necessary programs forconverting UNIX password files to the shadow password format, plusprograms for managing user and group accounts. The pwconv commandconverts passwords to the shadow password format. The pwunconv commandunconverts shadow passwords and generates a passwd file (a standardUNIX password file). The pwck command checks the integrity of passwordand shadow files. The lastlog command prints out the last login timesfor all users. The useradd, userdel, and usermod commands are used formanaging user accounts. The groupadd, groupdel, and groupmod commandsare used for managing group accounts.

You might be interested in
Which is a gallery of pr design pictures that can be inserted directly in the document​
fredd [130]

Answer:

.,.,.,.,.,.,.,.,.,.,.,.,.

6 0
3 years ago
Python
andreyandreev [35.5K]

Answer:

<h2>1)   </h2>

h = 19  # h is already assigned a positive integer value 19

i = 1  # used to calculate perfect square

q = 0   # stores the sum of the perfect squares

while q < h:  

# this loop executes until value of number of perfect squares is less than h

   q = q + (i*i)  # to calculate the sum of perfect squares

   i = i + 1  # increments i by 1 at every iteration

print(q) # displays the sum of perfect squares

Output:

30

Explanation:

Here we see that the sum of the perfect square is printed in the output i.e. 30. If we want to assign value 4 to q then we should alter the code as  following:  

h = 19

i = 1

sum_of_ps = 0

q=0

while sum_of_ps < h:

   sum_of_ps = sum_of_ps + (i*i)

   q = q + 1

   i = i + 1  

print(q)  

If you want to take input from the user and also display the perfect squares in output you can use the following code:

h = int(input('Enter the value of h: ')) #takes value of h from user

i = 1

sum_of_ps = 0

q=0

while sum_of_ps < h:

   sum_of_ps = sum_of_ps + (i*i)

   print(i*i) #displays the perfect squares of h

   q = q + 1

   i = i + 1    

print(sum_of_ps)   #displays sum of perfect squares

print(q) #displays number of perfect squares whose value is less than h

Output:

1

4

9

16

30

4

<h2>2)</h2>

# k and m are already assigned positive integers 10 and 40

k = 10  

m = 40  

i = 1  # i is initialized to 1

q = 0  # q stores the number of perfect squares between k and m

while i*i < m:  # loop computes perfect square of numbers between k and m

   if i*i > k:          

       q = q + 1  # counts the number of perfect squares

   i = i + 1  #increments the value of i at each iteration

print (q) # prints the no of perfect squares between k and m

If you want to display the perfect squares too use , add print(i*i) statement after if statement  if i*i > k:        

Output:

3

<h2>3)</h2>

def Fibonacci(n):  # method Fibonacci which has an integer parameter n

   if n <= 1:  # if the value of n is less than or equals to 1

       result = n  # stores the value of n into result

   elif n > 1:  # else if the value of n is greater than 1

       result = Fibonacci(n-1) + Fibonacci(n-2)  

# calls Fibonacci method recursively to associate nth value of Fibonacci #sequence with variable result

   return result     #returns the final value stored in result variable

print(Fibonacci(8))

#calls Fibonacci function and passes value 8 to it

Output:

21

8 0
3 years ago
Which of the following is the main consideration when choosing an appropriate outlet box?
mafiozo [28]
How much power is going through the out let <span />
4 0
3 years ago
Read 2 more answers
Point out the correct statement.
NeTakaya

Answer:

Option D is correct.

Explanation:

Cassandra labeling information with such a gravestone indicates should restart transmitting an erase request to such a duplicate that had been down earlier of deletion.

Cassandra may not instantly delete information labeled for removal from disc the removal of identified information takes place throughout compaction a deleted section may reappear when a maintenance is never regularly carried out.

4 0
3 years ago
User Jsmith is a member of the Accounting and Contractor groups, and is trying to save a file to Folder A on his local computer,
DochEvi [55]

Answer and Explanation:

Jsmith's membership in the Contractor group means that he has been denied all access to the folder.

4 0
4 years ago
Other questions:
  • Which of the following will affect the size of your monthly mortgage payment? A The size of your down payment B The length of yo
    5·1 answer
  • Explain how to implement two stacks in one array A[1..n] in such a way that neither stack overflows unless the total number elem
    7·1 answer
  • Why does fiber optic communication technology have a significant security advantage over other transmission technology? higher d
    6·1 answer
  • Problem 4 (25 points)Consider a byte addressing architecture with 64-bit memory addresses.(a)Which bits of the address would be
    5·1 answer
  • Comprehension s best described as the ability to
    15·2 answers
  • Mingji is working to transfer photos from her digital camera to her computer. While
    11·1 answer
  • Can someone please help me with this ,it is my assignment of technology and agriculture year 8
    5·1 answer
  • What is closeable interface in java.
    12·1 answer
  • Which computer language uses short words known as mnemonics for writing programs?
    14·1 answer
  • _______ is a very common approach to multisystem authorization.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!