1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
2 years ago
15

Which package is required for shadow passwords to be enabled?.

Computers and Technology
1 answer:
Lelechka [254]2 years ago
3 0

Answer:

For shadow passwords the shadow-utils package to be enabled

Explanation:

The shadow-utils package includes the necessary programs forconverting UNIX password files to the shadow password format, plusprograms for managing user and group accounts. The pwconv commandconverts passwords to the shadow password format. The pwunconv commandunconverts shadow passwords and generates a passwd file (a standardUNIX password file). The pwck command checks the integrity of passwordand shadow files. The lastlog command prints out the last login timesfor all users. The useradd, userdel, and usermod commands are used formanaging user accounts. The groupadd, groupdel, and groupmod commandsare used for managing group accounts.

You might be interested in
Factor completely: 4y^2 - y - 3
notsponge [240]

Answer:

(4y + 3)(y - 1)

Explanation:

4 {y}^{2}  - y  - 3

4 {y}^{2}  - 4y + 3y - 3

4y(y  - 1) + 3(y - 1)

(4y + 3)(y - 1)

7 0
2 years ago
Read 2 more answers
Explain block diagram of. computer architure​
ozzi

Answer:

A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.

Explanation:

In your question you asked architure but maybe it is architecture (•;

5 0
2 years ago
_________________: informal messages that are passed on from person to person
sasho [114]

Answer:

Grapevine is the answer

4 0
3 years ago
Is the ipv6 address 2001:1d5::30a::1 a valid address? why or why not?
defon
<span>Not a valid IPv6 address A valid IPv6 address consist of 8 groups of 4 hexadecimal numbers separated by colons ":". But that can make for a rather long address of 39 characters. So you're allowed to abbreviate an IPv6 address by getting rid of superfluous zeros. The superfluous zeros are leading zeros in each group of 4 digits, but you have to leave at least one digit in each group. The final elimination of 1 or more groups of all zeros is to use a double colon "::" to replace one or more groups of all zeros. But you can only do that once. Otherwise, it results in an ambiguous IP address. For the example of 2001:1d5::30a::1, there are two such omissions, meaning that the address can be any of 2001:1d5:0:30a:0:0:0:1 2001:1d5:0:0:30a:0:0:1 2001:1d5:0:0:0:30a:0:1 And since you can't determine which it is, it's not a valid IP address.</span>
6 0
3 years ago
How do you post a picture on brainly? How do you also lower the points to like 5,brainless to the first understandable answers
Morgarella [4.7K]
To post a picture you just need to click on the clipper looking thing 
3 0
3 years ago
Other questions:
  • What option is available on a Host A record to tell the system how long the record should remain in the database after it was cr
    15·1 answer
  • Help, please!! A file named "games.txt" exists and has 80 lines of data. You open the file with the following line of code. aFil
    6·1 answer
  • What type of software is responsible for managing processor time and memory allocation?
    7·1 answer
  • What is network topology? PLZZZ HURRY
    9·1 answer
  • The Harrison Group Life Insurance company computes annual policy premiums based on the age the customer turns in the current cal
    5·1 answer
  • . In the BorderLayout class, what are NORTH, SOUTH, EAST, WEST, and CENTER?
    15·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • Pleaseeeeeeee tellllllllllllllllllllll​
    8·1 answer
  • Identify the angle.
    12·1 answer
  • You are using a device that reads the physical addresses contained in incoming data that travels along network cables. Based on
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!