1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
1 year ago
5

What chage command should you use to set the password for jsmith to expire after 60 days and give a warning 10 days before it ex

pires? (tip: enter the command as if at the command prompt.)
Computers and Technology
1 answer:
nata0808 [166]1 year ago
7 0

chage -M 60 -W 10 jsmith Forces jsmith to keep the password 60 days before changing it and gives a warning 10 days before changing it.

<h3>Which command should you use to set the expiration date for a user account?</h3>

The “chage” command is used to modify the password expiry date of the user's account in which you can change the current status of the expiry date, set expiry date to lock the account, active and passive status, and warning days before the account get expired.

<h3>What is chage command Linux?</h3>

The chage command is self-described as the "change user password expiry information" utility. According to the chage man page: The chage command changes the number of days between password changes and the date of the last password change.

To learn more about chage command, refer

brainly.com/question/13084023

#SPJ4

You might be interested in
Yazmin is reading a book that has 74 pages. She has read 38 pages. How many more pages does she need to read to finish the book​
Brut [27]

Answer:

36 book

im sure it is correct

4 0
3 years ago
Application of optical fibre​
densk [106]

Answer:

Internet data transfer.

Explanation:

Optical fibre can be used to move information from one place to another. It is used in internet communications, cable television broadcasting, and telephone communication. One common application is for the transfer of data over the internet. Chances are your browser was able to download this web page by receiving data that came from Brainly's servers, and from my computer, through a fibre optic cable.

4 0
3 years ago
You can use view the ______ file to view the hard drive details.
Anastaziya [24]

Answer:

/proc/partitions

5 0
2 years ago
Many documents use a specific format for a person's name. Write a program whose input is: firstName middleName lastName and whos
goblinko [34]

Answer:

The solution code is written in Python:

  1. name = input("Enter your name: ")
  2. name_components = name.split(" ")
  3. first_name = name_components[0]
  4. middle_name = name_components[1]
  5. last_name = name_components[2]
  6. print(last_name + ", " + first_name[0] + "." + middle_name[0])

Explanation:

Firstly, prompt user to enter name (Line 1).

Next, use the string <em>split()</em> method and use space " " as separator to split the input string into individual component, first name, middle name, last name and assign to variable <em>first_name, middle_name </em>and<em> last_name </em>(Line 5-7).

Display the output as required by the question.

6 0
3 years ago
Differentiate between time high and time low?
Y_Kistochka [10]
STAR PLATINUM ZA WARUDO... ORA ORA ORA ORA ORA ORA ORA ORA ORA
7 0
3 years ago
Other questions:
  • Which sector provides scope for multimedia designers?
    10·1 answer
  • Which wildcat character will return a single character when using the find dialog box
    14·1 answer
  • A critical piece of equipment that provides power to systems even during a black out is called a(n) _______________.
    14·1 answer
  • The main workplace of a Windows computer is called the
    14·1 answer
  • How is marketing related to the other functions of a business
    14·1 answer
  • An experienced user has installed Oracle VM VirtualBox on her workstation and is attempting to use it to create a virtual machin
    6·1 answer
  • What is wrong with the following declaration? How should it be fixed?
    11·1 answer
  • What are the 6 external parts of a computer system
    5·1 answer
  • An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply thos
    5·2 answers
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!