1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aloiza [94]
1 year ago
5

What chage command should you use to set the password for jsmith to expire after 60 days and give a warning 10 days before it ex

pires? (tip: enter the command as if at the command prompt.)
Computers and Technology
1 answer:
nata0808 [166]1 year ago
7 0

chage -M 60 -W 10 jsmith Forces jsmith to keep the password 60 days before changing it and gives a warning 10 days before changing it.

<h3>Which command should you use to set the expiration date for a user account?</h3>

The “chage” command is used to modify the password expiry date of the user's account in which you can change the current status of the expiry date, set expiry date to lock the account, active and passive status, and warning days before the account get expired.

<h3>What is chage command Linux?</h3>

The chage command is self-described as the "change user password expiry information" utility. According to the chage man page: The chage command changes the number of days between password changes and the date of the last password change.

To learn more about chage command, refer

brainly.com/question/13084023

#SPJ4

You might be interested in
Which of the following is the best example of a manager with a delegator leadership style
Vera_Pavlovna [14]
I think the answer should be answer D.
8 0
3 years ago
Read 2 more answers
Which of the following electronic payments is ideal for micropayments?
timama [110]

Answer:

B. smart cards

Explanation:

3 0
3 years ago
Read 2 more answers
Edward has started up a new company with his friend, Matthew. Currently, he has only two people working with him. Which type of
Kruka [31]

A Peer-to-peer network architecture would work best for Edward and Matthew.

Although they have the option of creating a Client-Server type of network architecture, the number of people that they are currently working with would cost them a lot more than a peer-to-peer architecture.

One of the advantages of using a Peer-to-peer network architecture for a small network would be the access of files between all computers in the network. Even if one of the computers will fail, the other computers will still have access to the different files and information they will need to keep the company moving forward.

6 0
3 years ago
A researcher is interested in whether working memory is influenced by lack of sleep. The researcher administered a measure of wo
ale4655 [162]

Answer:

Dependent sample t-test

Explanation:

The Dependent sample t-test compares the mean score of measurements in one group to that of another other group. It mainly used when analyzing comparable sample units as it pairs repeatable observations within a time frame.

For example, a researcher administered a measure of working memory to a group of subjects at 8am on Day 1 of the study and then again at 8am on Day 2 of the study, after keeping the subjects awake the entire night.

5 0
3 years ago
Write a program that lets the user enter four quarterly sales figures for six divisions of a company. The figures should be stor
NeTakaya

Answer: Buisness calendars

Explanation:

7 0
2 years ago
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • Which of the following is an example of subjunctive verb mood?
    5·1 answer
  • You are troubleshooting an interface issue on your cisco ios isr. the output of "show ip interface brief" indicates that etherne
    11·1 answer
  • What is the block of text at the bottom of the page called?
    7·1 answer
  • What is <br> central vision
    12·2 answers
  • Are the actions legal or illegal?
    13·1 answer
  • Over the past three hours the pressure has been steadily increasing at a rate of what
    6·1 answer
  • You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
    9·1 answer
  • Creating a Venn diagram takes specialized computer software.
    15·2 answers
  • What does input allow a computer to do
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!