1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gayaneshka [121]
3 years ago
10

Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user

?
A. /var
B. /usr
C. /bin
D. /sbin
Computers and Technology
1 answer:
dlinn [17]3 years ago
4 0

Answer: /sbin

Explanation:

In Linux, FHS describes the directory content and the way in which Operating System files are displayed to the user.

/sbin is a directory that contains executable programs. s/bin is the short form of system binaries. System binaries require root rights to perform specific tasks. /sbin contains binaries that are crucial to boot the system and also to recover and restore the system. /bin directory also contains the commands to boot the system but the main difference between both is that /sbin programs can only be executed by the root user. Examples are fdisk, fsck, root,halt, init, grub, ifconfig.

You might be interested in
All the data points lie within UCL & LCL and all of the data points are randomly distributed about the mean value central li
nata0808 [166]

Answer: Common causes

Explanation:

Variation comes from two sources, common and special causes. Lets you at this scenario, how long it takes you to get to school in the morning. Maybe it takes you 40 minutes on average. Some days it may take a little longer, some days a little shorter. But as long as you are within a certain range, you are not concerned. The range may be from 35 to 45 minutes. This variation represents common cause variation --- it is the variation that is always present in the process. And this type of variation is consistent, random and predictable. You don't know how long it will take to get to schooltomorrow, but you know that it will be between 35and 45 minutes as long as the process remains the same.

Now, in thecase of special cause variation suppose there was an accident on the road and there was heavy non moving traffic . How long will it take you to get to work? Definitely longer than the 35 to 45 minutes in your "normal" variation. Maybe it takes you an hour longer. This is a special cause of variation. Something is different. Something happened that was not supposed to happen. It is not part of the normal process. Special causes are not predictable, non random and are sporadic in nature.

6 0
4 years ago
Hard disk is a sequential data access medium. true or false?​
Crazy boy [7]

My answer is TRUE

Explanation:

Hope it help!!

3 0
3 years ago
_____ is the process of bypassing the built-in limitations and protections of a mobile device. Group of answer choices D. Slicin
katrin2010 [14]

Answer:

C

Explanation:

Jailbreaking is the process of bypassing the built-in limitations and protections of a mobile device

7 0
3 years ago
Apart from the challenges of heterogeneity, business and social change and trust and security, identify other problems and chall
Klio2033 [76]

Answer:

The challenge of cost control

The challenge of competence

The challenge of reduced system delivery times.

Explanation:The Challenge of Cost control is a major challenge affecting the software engineering in the 21st century,the cost of Microchips and other hardware are constantly rising.

The challenge of competence is another major challenge affecting software engineering in the 21st century,as most software engineers lack the required competence to handle some of the issues facing softwares.

The challenge of reduced system delivery times is a major challenge likely to affect software engineering in the 21st century,as people required the software to be available in the shortest possible time.

7 0
3 years ago
________ is used to undo unwanted database changes.
riadik2000 [5.3K]
Backward Recovery would be the answer.

(:
5 0
4 years ago
Read 2 more answers
Other questions:
  • Charles sends Julia text messages every morning insulting her appearance and threatening to hurt her. He writes unflattering des
    5·2 answers
  • Marijuana and hashish come from the hemp plant?
    10·1 answer
  • Write a function that will alphabetize a string WITHOUT using the sort function :
    7·1 answer
  • Pls help me
    5·1 answer
  • Write a function to reverse a given string. The parameter to the function is a string. Function should store the reverse of the
    12·1 answer
  • How are air masses and fronts the same. And how are they different. ​
    8·1 answer
  • What is an example of a hard skill?
    12·2 answers
  • Which of the following is an example of an open-ended question?
    15·1 answer
  • (4 points.) Write an algorithm (i.e., step-by-step instructions) via which someone could walk or drive from some origin to some
    8·1 answer
  • What is the best data type for traveling day?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!