1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
10

âwhat two log files are used by older versions of unix and newer version of linux to store log information

Computers and Technology
2 answers:
Aleksandr [31]3 years ago
6 0
/var/log/messages and <span>/var/adm/messages  - Log files are files that contain system status messages and  information. There are various types of log files, maintained for various purposes. For example, there are default log files, log files for storing security messages and log files to store cron tasks. By default, /etc/syslog.conf file saves most system messages to the </span><span>/var/adm/messages file. Boot messages, as well as crash messages are also saved here.General messages and those related to  the system are stored by linux in the </span><span>/var/log/messages folder. </span>
Free_Kalibri [48]3 years ago
4 0
There are many log files in /var/log or /var/adm that log messages from different daemons. They have different names depending on which *nix you're working with.
You might be interested in
ppose we have a Rectangle class that includes length and width attributes, of type int, both set by the constructor. Define an e
vichka [17]

Answer:

Check the explanation

Explanation:

#include <bits/stdc++.h>

using namespace std;

class Rectangle{

  public:

      int length;

      int breadth;

      Rectangle(int l,int b){

          length = l;

          breadth = b;

      }

      int area(){

          return length*breadth;

      }

      int perimeter(){

          return 2*(length+breadth);

      }

      bool equals(Rectangle* r){

          // They have the exact same length and width.

          if (r->length == length && r->breadth == breadth)

              return true;

          // They have the same area

          if (r->area() == area())

              return true;

          // They have the same perimeter

          if (r->perimeter() == perimeter())

              return true;

          // They have the same shape-that is, they are similar.

          if (r->length/length == r->breadth/breadth)

              return true;

          return false;

      }

};

int main(){

  Rectangle *r_1 = new Rectangle(6,3);

  Rectangle *r_2 = new Rectangle(3,6);

  cout << r_1->equals(r_2) << endl;

  return 0;

}

8 0
3 years ago
Members of the sales team use laptops to connect to the company network. While traveling, they connect their laptops to the inte
coldgirl [10]

Answer: Network access control (NAC)

Explanation:

The solution that should be used is the network access control. Network access control helps in keeping devices and users that are unauthorized out of ones private network.

In this case, since one will like to prevent the laptops from connecting to the network unless anti-virus software and the latest operating system patches are installed, then the network access control can be used. One can only give access to the device that it wants to give access to and prevent others from connecting.

3 0
2 years ago
Why we use cluster computing and hadoop framework for big data sysetm​
Ber [7]

Answer:

Explanation:

Hadoop clusters can boost the processing speed of many big data analytics jobs, given their ability to break down large computational tasks into smaller tasks that can be run in a parallel, distributed fashion.

5 0
2 years ago
Mrs. Patel uses a computer program to balance her checkbook. Which of the following best explains how the
Alexandra [31]

Answer:

c it reduces errors

Explanation:

Instead of Mrs.Patel doing it she has an online program made for checks to do it for her.

6 0
3 years ago
Java Homework:(The Person, Student, Employee, Faculty, and Staff classes) Design a class named Person and its two subclasses nam
miss Akunina [59]

Answer: Wait, so what is the question exactly..?

8 0
3 years ago
Other questions:
  • The maximum number of colors that should be used on a slide is _____. 2 4 6 8
    12·2 answers
  • Which of the following is a useful policy to minimize waste and mistakes?
    6·1 answer
  • You are manually configuring a tcp/ip host. another administrator gives you the router's ip address. what is the tcp/ip term for
    6·2 answers
  • What are two examples of ways an electronic record may be distributed to others?
    15·1 answer
  • Which component is a part of the CPU of a computer
    12·2 answers
  • What is 36 Denary in Binary?? PLEASE ANSWER I WILL GIVE U BRAINLY!!
    9·2 answers
  • can somebody please explain to me why I woke up today to see that all of my 40 answers where deleted ? like what I spent hours
    11·2 answers
  • Explain the major innavotions made from the establishment of abacus​
    8·1 answer
  • Defination of formula bar​
    14·1 answer
  • What is a man-in-the-middle attack​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!