1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ilya [14]
2 years ago
5

you're using a linux distribution that uses rpm for package management. which command would you use to install httpd, the apache

http server package, and all its dependencies?
Computers and Technology
1 answer:
jeka57 [31]2 years ago
6 0

The command that a person would use to install httpd is known to be yum install httpd.

<h3>What is the command about?</h3>

Note that in any Linux distribution that often employs the use of RPM for package management, the act of inputting yum install httpd at the command line will hep a person to be able to install the Apache HTTP Server package and any of its dependencies.

Note that YUM automatically find and downloads RPM packages and as such The command that a person would use to install httpd is known to be yum install httpd.

Learn more about  linux distribution from

brainly.com/question/13139061

#SPJ11

You might be interested in
Fill in the blanks!
Simora [160]

Answer:

software...turned on

Explanation:

5 0
3 years ago
If you have related data stored in multiple tables, create a(n) ________ to produce a pivottable on the combined data.
vladimir1956 [14]
If you have related data stored in multiple tables, create a Data model to<span> produce a pivot table on the combined data.
In computer term, data model refers to how each data are connected to one another and how those connections are being processed within the Sysyem</span>
3 0
4 years ago
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access.
jeyben [28]

Answer:

The answer is "use P2P method".

Explanation:

In Corporation are starting to regard P2P is a method, which enabling workers to transfer files directly, reducing the expenses and construction connected with a central network.

  • It allows corporations to make the use of often latent resources on both the computer for each worker.
  • It will also be forced to control access to data to protect the privacy and sensitive materials, and will also be able to encrypt files by code.

5 0
3 years ago
How can we keep technology alive?
kotegsom [21]
"<span>How can we keep technology alive?" It will always stay alive

"</span><span>What is the history of educational technology?" Once The University of Pennsylvania made the first computer

"</span><span>What are the benefits of using technology for teaching and learning?"  It is easier to do homework, turn in homework, do course recovery, and easier to check your grades.

"How will it benefit children in the future?" Same way it does now, and even more.
</span> 
5 0
3 years ago
1. Choose in each case that it affects which of the Information security requirements (confidentiality, integrity, availability)
just olya [345]

The  cases that it affects which of the Information security requirements is explained below.

<h3>What are the Information security violations of the above cases?</h3>

Someone has copied your credit card and CVV number has violated the confidentiality as this is to be known only by the owner for if the cvv is known by another person who is not the owner, it may lead to theft of the owners' funds/money.

If someone sends a message “Please come at 10 AM”, the receiver receives “Please come at 10.” and the person did miss the appointment due to the misinformation, it violates the availability. If one is not understanding a message, it is better to clarify so as to know if one will be available,

If the attacker has deleted the installed copy of the Microsoft Office application from your laptop is integrity/confidentiality. One who has integrity will not attack another's' system.

learn more about confidentiality from

brainly.com/question/863709

6 0
3 years ago
Other questions:
  • Assign to avg_owls the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4 3
    7·1 answer
  • What is the definition of online communication
    15·1 answer
  • The ____ search feature allows you to look for words with extensions such as “ing,”“ed,” and so forth. .
    12·1 answer
  • P**nhub or x-videos or other
    9·1 answer
  • Nappropriate use of technology makes it easier for cyber bullies to <br> others.
    5·2 answers
  • The whole-part relationship created by object aggregation is more often called:___________.
    12·1 answer
  • What is internal storage device
    14·1 answer
  • Pls help me!! I will give 35 points and mark brainliest !!!
    10·1 answer
  • Where to get industrial circuits far cry 6
    8·1 answer
  • Write a program that allows the user to enter three separate strings: a city name, a state name, and a ZIP code.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!