1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
10

Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user

?
A. /var
B. /usr
C. /bin
D. /sbin
Computers and Technology
1 answer:
dlinn [17]3 years ago
4 0

Answer: /sbin

Explanation:

In Linux, FHS describes the directory content and the way in which Operating System files are displayed to the user.

/sbin is a directory that contains executable programs. s/bin is the short form of system binaries. System binaries require root rights to perform specific tasks. /sbin contains binaries that are crucial to boot the system and also to recover and restore the system. /bin directory also contains the commands to boot the system but the main difference between both is that /sbin programs can only be executed by the root user. Examples are fdisk, fsck, root,halt, init, grub, ifconfig.

You might be interested in
Which of the following is a requirement for the Safety Data Sheet (SDS)?​
Natasha_Volkova [10]
What are the options?
4 0
3 years ago
Please someone helppppppp
Cerrena [4.2K]

Answer : communicate is the answer.

5 0
2 years ago
Read 2 more answers
What can search the internet and select elements based on important words
Lana71 [14]

The item in question is known as a web search engine. These services will crawl websites and gather information about web pages to present to the searching user based on the search terms compared to the content of the webpage.

7 0
3 years ago
What are the WORST computer malware in your opinion it can be worms backdoors and trojans I just want a input, nothing right or
tankabanditka [31]

Answer:

I think probably mydoom

Explanation:

as it estimated 38 billion dollars in damage, also this malware is technically a worm

5 0
2 years ago
Which of the following is a good question to ask during an informational interview?
grin007 [14]
How do you know your information is valid?
8 0
3 years ago
Read 2 more answers
Other questions:
  • Janelle went to update the last name for one of her group contacts. She double-clicked on the contact, changed the last name, an
    12·2 answers
  • What is a perfect hashing function?
    13·1 answer
  • What is the first thing you should do when troubleshooting a computer problem
    5·2 answers
  • Write a loop to output the word EXAM 99 times
    8·1 answer
  • Can I use some Company's name in my Research Project. For example, my research is based on E-commerce security and i wanna use A
    14·1 answer
  • Within the sites that support disaster recovery, ___________ is a separate and fully equipped facility where the company can mov
    6·1 answer
  • Which of the following situations would not require knowledge of networking?
    11·2 answers
  • Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure
    10·2 answers
  • Which tab on the Ribbon contains the command to print a publication?
    10·1 answer
  • 1.Know the BMI of the user. First, the user will input the height in meters and weight in kilograms. After inputting, the inputt
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!