1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
1 year ago
5

What chage command should you use to set the password for jsmith to expire after 60 days and give a warning 10 days before it ex

pires? (tip: enter the command as if at the command prompt.)
Computers and Technology
1 answer:
nata0808 [166]1 year ago
7 0

chage -M 60 -W 10 jsmith Forces jsmith to keep the password 60 days before changing it and gives a warning 10 days before changing it.

<h3>Which command should you use to set the expiration date for a user account?</h3>

The “chage” command is used to modify the password expiry date of the user's account in which you can change the current status of the expiry date, set expiry date to lock the account, active and passive status, and warning days before the account get expired.

<h3>What is chage command Linux?</h3>

The chage command is self-described as the "change user password expiry information" utility. According to the chage man page: The chage command changes the number of days between password changes and the date of the last password change.

To learn more about chage command, refer

brainly.com/question/13084023

#SPJ4

You might be interested in
QUESTION 1 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through
valkas [14]

Answer:

The correct answer to the following question will be Option B (Public key infrastructure).

Explanation:

This seems to be a program that allows an individual to deliver an encrypted message or file through some kind of public key that can be unlocked by the intended receiver using another key or code, almost always a private or personal key.

  • This is a collection of functions, rules, equipment, applications, and methods required to develop, maintain, deliver, utilize, save, and withdraw digital credentials, and handle encryption with the public key.
  • This safeguards against hacking or interference with customer information or data.

6 0
3 years ago
PLEASE HELP THANK YOU
Andrei [34K]

Answer:

1) A string is "non-numeric data".  In other words, it is text.

2) False, a runtime error means that there is a problem, but it will be with the software, not the hardware.

3) An impossible task such as dividing five by zero is a logical error.  Not using quotes on a string would be a syntax error, printing an inaccurate statement is not an error at all (as far as the program is concerned anyway), and using camelcase on a variable with multiple words is a common convention.

4) variableName = "value"

5) The code provided here is illegible, so I can't give a straight answer. It seems to be missing operators.

6 0
3 years ago
What does the program 7-zip do for the files on your computer
IrinaK [193]
It condenses and expands files so they move easily over the internet.. You should never remove it.
8 0
4 years ago
i want to write a program that display that pattern *********** *********** *********** *********** *********** *********** ****
kodGreya [7K]
Im sorry, but for me to answer the question, I need the full question
4 0
4 years ago
What is computer generation​
MA_775_DIABLO [31]

Answer:

Generation in computer terminology is a change in technology a computer is/was being used which includes hardware and software to make of an entire computer system .

8 0
2 years ago
Other questions:
  • In an email, above subject, what does cc mean?
    13·1 answer
  • By apply styles, _____________ formats are being applied each time.
    6·1 answer
  • Which ipv6 static route would serve as a backup route to a dynamic route learned through ospf?
    12·1 answer
  • What is the name of google's mobile operating system, used on smartphones and tablets from many manufacturers?
    6·1 answer
  • There are only three active stations in a slotted aloha network: a, b, andc. each station generates a frame in a time slot with
    15·1 answer
  • What expressions will initialize d with a random value such that all possible values for d are given by the inequality 1.5 ≤ d &
    8·1 answer
  • What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital
    10·1 answer
  • Do you play Rocket League
    10·2 answers
  • URGENT!! thank you!!!!!
    9·1 answer
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!