1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
10

âwhat two log files are used by older versions of unix and newer version of linux to store log information

Computers and Technology
2 answers:
Aleksandr [31]3 years ago
6 0
/var/log/messages and <span>/var/adm/messages  - Log files are files that contain system status messages and  information. There are various types of log files, maintained for various purposes. For example, there are default log files, log files for storing security messages and log files to store cron tasks. By default, /etc/syslog.conf file saves most system messages to the </span><span>/var/adm/messages file. Boot messages, as well as crash messages are also saved here.General messages and those related to  the system are stored by linux in the </span><span>/var/log/messages folder. </span>
Free_Kalibri [48]3 years ago
4 0
There are many log files in /var/log or /var/adm that log messages from different daemons. They have different names depending on which *nix you're working with.
You might be interested in
For a loop counter, the appropriate data type would be:
BigorU [14]

Answer:a) int

Explanation: Loop counter is the kind of program that has the major function of counting the start value to the destination value in the form of integer.The integer is used for counting the values in a particular loop is known as the loop control variable.Therefore the accurate datatype for the loop counter to count the values should be of int type.

8 0
3 years ago
what is the restaurant with the black pom tree and yellow backround three letter name from hi guess the restaurant
vekshin1
In 'N' Out, and KFC (Kentucky Fried Chicken)
7 0
3 years ago
Read 2 more answers
9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
DaniilM [7]

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

8 0
4 years ago
To ____ a public member function of a base class in the derived class, the corresponding function in the derived class must have
Norma-Jean [14]

Answer:

None of the mentioned options

Explanation:

  • If we define a method in a derived class with same declaration type as that of base class then it is said to be overriding a function which behaves differently which will depend on the object which is calling the method.
  • Option a,b and c are not any kind of methods we implement using coding.
  • Option d is done when number or data types of parameters are different than the declaration of the base type.

8 0
3 years ago
Add code to this loop, to pick up all of the radios, with only seven blocks.
Goshia [24]

Answer:

umm

Explanation:

what do you mean by that

4 0
3 years ago
Other questions:
  • A disadvantage of creating a website with tables, without CSS is
    15·2 answers
  • The very first thing I should type when creating a formula in excel is:
    15·2 answers
  • A superscope is a special type of scope that allows a dhcp server to service multiple ipv4 subnets on multiple physical networks
    7·1 answer
  • What is the first step to creating a PivotTable?
    11·1 answer
  • When Lisa purchased her house the mortgage lender required homeowners insurance to cover 100% of the loan amount. After many yea
    7·2 answers
  • Effective presentations vary the color scheme on each slide.
    7·2 answers
  • What are the names of the four major varnas in the caste system?​
    9·2 answers
  • When should you save your document?
    15·2 answers
  • .... . .-.. .-.. --- .-.-.-<br><br><br> TRANSLATE THAT.
    10·1 answer
  • Do pc players ever go outside?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!